-
2
-
-
85171948912
-
-
Washington, DC: Congressional Research Service
-
Best, R. (2009). Intelligence issues for Congress. Washington, DC: Congressional Research Service. http://www.fas.org/sgp/crs/intel/RL33539.pdf (http://www.fas.org/sgp/crs/intel/RL33539.pdf)
-
(2009)
Intelligence issues for Congress
-
-
Best, R.1
-
3
-
-
43949139273
-
Swimming against the current: The hidden developmental state in the U.S
-
Block, F. (2007). Swimming against the current: The hidden developmental state in the U.S. Politics and Society. 36, pp. 169-206. http://sociology.ucdavis.edu/people/fzblock/pdf/swimming.pdf (http://sociology.ucdavis.edu/people/fzblock/pdf/swimming.pdf)
-
(2007)
Politics and Society
, vol.36
, pp. 169-206
-
-
Block, F.1
-
4
-
-
84862233509
-
-
Pittsburgh, PA: Carnegie Melon University
-
Carley, K. (2009). Dynamic network analysis for counter-terrorism. Pittsburgh, PA: Carnegie Melon University. http://www.nap.edu/openbook.php?record_id=12083&page=169
-
(2009)
Dynamic network analysis for counter-terrorism
-
-
Carley, K.1
-
5
-
-
84878459561
-
-
Pittsburgh, PA: Carnegie Melon University
-
Carley, K., Diesner, J., Reminga, J., & Tsvetovat, M. (2006). Toward an interoperable dynamic network analysis toolkit. Pittsburgh, PA: Carnegie Melon University. http://https://community.bus.emory.edu/dept/ISOM/Shared%20Documents/Hightower%20Speaker%20Papers/KathleenCarley.pdf
-
(2006)
Toward an interoperable dynamic network analysis toolkit
-
-
Carley, K.1
Diesner, J.2
Reminga, J.3
Tsvetovat, M.4
-
6
-
-
47049107175
-
Government data mining: The need for a legal framework
-
Cate, F. (2008). Government data mining: The need for a legal framework. Harvard Civil Rights-Civil Liberties Law Review, 43(2), pp. 435-489. http://www.law.harvard.edu/students/orgs/crcl/vol43_2/435-490_Cate.pdf (http://www.law.harvard.edu/students/orgs/crcl/vol43_2/435-490_Cate.pdf)
-
(2008)
Harvard Civil Rights-Civil Liberties Law Review
, vol.43
, Issue.2
, pp. 435-489
-
-
Cate, F.1
-
7
-
-
0010454419
-
-
University Park, PA: The Pennsylvania State University Press
-
Crenshaw, M. 2005. Terrorism in context, University Park, PA: The Pennsylvania State University Press.
-
(2005)
Terrorism in context
-
-
Crenshaw, M.1
-
8
-
-
27844571691
-
-
Washington, DC: The CSIC Press
-
DeRosa, M. (2004). Data mining and data analysis for counterterrorism. Washington, DC: The CSIC Press. http://csis.org/files/media/csis/pubs/040301_data_mining_report.pdf (http://csis.org/files/media/csis/pubs/040301_data_mining_report.pdf)
-
(2004)
Data mining and data analysis for counterterrorism
-
-
DeRosa, M.1
-
9
-
-
84862235611
-
Data mining system and applications: A review
-
September
-
Deshpande, S. P., & Thakare, V. M. (2010, September). Data mining system and applications: A review. International Journal of Distributed and Parallel Systems, 1(1), pp. 32-44. http://airccse.org/journal/ijdps/papers/0910ijdps03.pdf (http://airccse.org/journal/ijdps/papers/0910ijdps03.pdf)
-
(2010)
International Journal of Distributed and Parallel Systems
, vol.1
, Issue.1
, pp. 32-44
-
-
Deshpande, S.P.1
Thakare, V.M.2
-
10
-
-
85171911855
-
-
Defense Advanced Research Projects Agency, Arlington, VA: Author
-
Defense Advanced Research Projects Agency. (2009). Strategic plan May 2009. Arlington, VA: Author. http://www.scribd.com/doc/15833928/Defense-Advanced-Research-Projects-Agencys-DARPA-Strategic-Plan-May-2009 (http://www.scribd.com/doc/15833928/Defense-Advanced-Research-Projects-Agencys-DARPA-Strategic-Plan-May-2009)
-
(2009)
Strategic plan May 2009
-
-
-
11
-
-
84862172173
-
-
Carbondale, IL: Southern Illinois University
-
Duval, R., Christenson, K., & Spahiu, A. (2010). Bootstrapping a terrorist network. Carbondale, IL: Southern Illinois University. http://opensiuc.lib.siu.edu/pnconfs (http://opensiuc.lib.siu.edu/pnconfs)
-
(2010)
Bootstrapping a terrorist network
-
-
Duval, R.1
Christenson, K.2
Spahiu, A.3
-
13
-
-
4243180814
-
-
Riverside, CA: University of California
-
Hanneman, R., & Riddle, M. (2005). Introduction to social network methods. Riverside, CA: University of California. http://faculty.ucr.edu/~hanneman/nettext/C1_Social_Network_Data.html (http://faculty.ucr.edu/~hanneman/nettext/C1_Social_Network_Data.html)
-
(2005)
Introduction to social network methods
-
-
Hanneman, R.1
Riddle, M.2
-
14
-
-
85171933675
-
-
The privacy implications of government data mining programs: Hearing before the United States Senate Committee on the Judiciary, (testimony of Kim Taipale)
-
The privacy implications of government data mining programs: Hearing before the United States Senate Committee on the Judiciary, (2007) (testimony of Kim Taipale). http://data-mining-testimony.info/ (http://data-mining-testimony.info/)
-
(2007)
-
-
-
15
-
-
0004114009
-
-
Washington, DC: Central Intelligence Agency, Center for the Study of Intelligence
-
Heuer, R. (1999). Psychology of intelligence analysis. Washington, DC: Central Intelligence Agency, Center for the Study of Intelligence. http://https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/index.html (http://https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/index.html)
-
(1999)
Psychology of intelligence analysist
-
-
Heuer, R.1
-
16
-
-
85171936808
-
Introduction to social network analysis as an investigative tool
-
the Netherlands: Research and Documentation Centre, Ministry of Justice
-
Hulst, R. (2009). Introduction to social network analysis as an investigative tool. The Hague, the Netherlands: Research and Documentation Centre, Ministry of Justice. http://web.ebscohost.com.ezproxy2.apus.edu/ehost/detail?vid=1&hid=10&sid=d013775abb12405cb8dd70f6c135091f%40sessionmgr13&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=tsh&AN=40529769.
-
(2009)
The Hague
-
-
Hulst, R.1
-
17
-
-
33746671934
-
-
Groningen, the Netherlands: University of Groningen
-
Huisman, M., & van Duijn, M. (2003). Software for social network analysis. Groningen, the Netherlands: University of Groningen. http://stat.gamma.rug.nl/Software%20for%20Social%20Network%20Analysis%20CUP_ch13_Oct2003.pdf (http://stat.gamma.rug.nl/Software%20for%20Social%20Network%20Analysis%20CUP_ch13_Oct2003.pdf)
-
(2003)
Software for social network analysis
-
-
Huisman, M.1
van Duijn, M.2
-
19
-
-
85171902873
-
-
Katz, v. 1967. U.S. 347,361: United States. 389
-
Katz, v. 1967. U.S. 347,361: United States. 389.
-
-
-
-
20
-
-
85171905996
-
-
London, England: RTO SCI Symposium on Systems, Concepts and Integration Methods and Technologies for Defence Against Terrorism
-
Koltko-Rivera, M. (2004). Detection of terrorist preparations by an artificial intelligence expert system employing fuzzy signal detection theory. London, England: RTO SCI Symposium on Systems, Concepts and Integration Methods and Technologies for Defence Against Terrorism. http://psg-fl.com/downloads/NATO%20-%20Detection%20of%20Terrorist%20Preparations.pdf (http://psg-fl.com/downloads/NATO%20-%20Detection%20of%20Terrorist%20Preparations.pdf)
-
(2004)
Detection of terrorist preparations by an artificial intelligence expert system employing fuzzy signal detection theory
-
-
Koltko-Rivera, M.1
-
22
-
-
7644224668
-
Uncloaking terrorist networks
-
Krebs, V. (2002). Uncloaking terrorist networks. First Monday, 7(4). http://131.193.153.231/www/issues/issue7_4/krebs/ (http://131.193.153.231/www/issues/issue7_4/krebs/)
-
(2002)
First Monday
, vol.7
, Issue.4
-
-
Krebs, V.1
-
23
-
-
0042773171
-
-
(Working Paper 9074). Washington, DC: National Bureau of Economic Research
-
Krueger, A., & Maleckova, J. (2002). Education, poverty, violence, and terrorism: Is there a causal connection? (Working Paper 9074). Washington, DC: National Bureau of Economic Research. www.nber.org/papers/W9074 (http://www.nber.org/papers/W9074)
-
(2002)
Education, poverty, violence, and terrorism: Is there a causal connection?
-
-
Krueger, A.1
Maleckova, J.2
-
24
-
-
85171904429
-
Social network analysis-linking foreign terrorist organizations
-
Kutcher, C. (2008). Social network analysis-linking foreign terrorist organizations. International Analyst Network. http://www.analyst-network.com/article.php?art_id=1590 (http://www.analyst-network.com/article.php?art_id=1590)
-
(2008)
International Analyst Network
-
-
Kutcher, C.1
-
25
-
-
77952513298
-
-
(FFI/RAPPORT-2004/04307). Kjeller, Norway: Norwegian Defense Research Establishment
-
Lia, B., & Skjolberg, K. (2004). Causes of terrorism: An expanded and updated review of the literature (FFI/RAPPORT-2004/04307). Kjeller, Norway: Norwegian Defense Research Establishment. http://rapporter.ffi.no/rapporter/2004/04307.pdf (http://rapporter.ffi.no/rapporter/2004/04307.pdf)
-
(2004)
Causes of terrorism: An expanded and updated review of the literature
-
-
Lia, B.1
Skjolberg, K.2
-
26
-
-
33644682591
-
-
Markle Foundation, New York, NY: Author
-
Markle Foundation. (2003). Creating a trusted network for homeland security. New York, NY: Author. http://www.markle.org/publications/666-creating-trusted-network-homeland-security (http://www.markle.org/publications/666-creating-trusted-network-homeland-security)
-
(2003)
Creating a trusted network for homeland security
-
-
-
28
-
-
84862237174
-
-
Carbondale, IL: Southern Illinois University
-
Perliger, A., & Pedahzur, A. (2010). Social network analysis in the study of terrorism and political violence. Carbondale, IL: Southern Illinois University. http://utexas.academia.edu/AmiPedahzur/Papers/290973/Social_Network_Analysis_in_the_Study_of_Terrorism_and_Political_Violence (http://utexas.academia.edu/AmiPedahzur/Papers/290973/Social_Network_Analysis_in_the_Study_of_Terrorism_and_Political_Violence)
-
(2010)
Social network analysis in the study of terrorism and political violence
-
-
Perliger, A.1
Pedahzur, A.2
-
29
-
-
85171933440
-
-
Tucson, AZ: The University of Arizona
-
Reid, E., & Chen, H. (2006). Mapping the contemporary terrorism research domain. Tucson, AZ: The University of Arizona. http://ai.arizona.edu/intranet/papers/paper-Reid-terrorism-researcher.pdf (http://ai.arizona.edu/intranet/papers/paper-Reid-terrorism-researcher.pdf)
-
(2006)
Mapping the contemporary terrorism research domain
-
-
Reid, E.1
Chen, H.2
-
30
-
-
3042791622
-
You are a suspect
-
November 14
-
Safire, W. (2002, November 14). You are a suspect. The New York Times. http://www.nytimes.com/2002/11/14/opinion/you-are-a-suspect.html (http://www.nytimes.com/2002/11/14/opinion/you-are-a-suspect.html)
-
(2002)
The New York Times
-
-
Safire, W.1
-
31
-
-
85171947490
-
-
Washington, DC: Congressional Research Service
-
Seifert, J. (2008). Data mining and homeland security: An overview. Washington, DC: Congressional Research Service. http://www.fas.org/sgp/crs/intel/RL31798.pdf (http://www.fas.org/sgp/crs/intel/RL31798.pdf)
-
(2008)
Data mining and homeland security: An overview
-
-
Seifert, J.1
-
33
-
-
34247229847
-
-
(Document number 214217). Washington, DC: Department of Justice
-
Smith, B., Damphouse, K., & Paxton, R. (2006). Pre-incident indicators of terrorist incidents: The identification of behavioral, geographic, and temporal patterns of preparatory conduct (Document number 214217). Washington, DC: Department of Justice. http://www.ncjrs.gov/pdffiles1/nij/grants/222909.pdf (http://www.ncjrs.gov/pdffiles1/nij/grants/222909.pdf)
-
(2006)
Pre-incident indicators of terrorist incidents: The identification of behavioral, geographic, and temporal patterns of preparatory conduct
-
-
Smith, B.1
Damphouse, K.2
Paxton, R.3
-
34
-
-
85171909464
-
-
U.S. Department of Homeland Security,Washington, DC: Author
-
U.S. Department of Homeland Security. (2007). 2007 report to Congress on the impact of data mining technologies on privacy and civil liberties. Washington, DC: Author. http://www.dhs.gov/xlibrary/assets/privacy/privacy_rpt_datamining_2008.pdf (http://www.dhs.gov/xlibrary/assets/privacy/privacy_rpt_datamining_2008.pdf)
-
(2007)
2007 report to Congress on the impact of data mining technologies on privacy and civil liberties
-
-
-
35
-
-
85171922738
-
-
U.S. Department of Homeland Security, Washington, DC: Author
-
U.S. Department of Homeland Security. (2010). 2010 data mining report to Congress. Washington, DC: Author. http://www.dhs.gov/xlibrary/assets/privacy/2010-dhs-data-mining-report.pdf (http://www.dhs.gov/xlibrary/assets/privacy/2010-dhs-data-mining-report.pdf)
-
(2010)
2010 data mining report to Congress
-
-
-
36
-
-
84862236079
-
-
Washington, DC: DARPA
-
Van Atta, R. (2008). Fifty years of innovation and discovery. Washington, DC: DARPA. www.darpa.mil/WorkArea/DownloadAsset.aspx?id=2553 (http://www.darpa.mil/WorkArea/DownloadAsset.aspx?id=2553)
-
(2008)
Fifty years of innovation and discovery
-
-
van Atta, R.1
-
37
-
-
0033196289
-
Networks, dynamics, and the small world phenomenon
-
Watts, D. J. (1999). Networks, dynamics, and the small world phenomenon. American Journal of Sociology, 13(2), pp. 493-527. http://www.cc.gatech.edu/~mihail/D.8802readings/watts-swp.pdf (http://www.cc.gatech.edu/~mihail/D.8802readings/watts-swp.pdf)
-
(1999)
American Journal of Sociology
, vol.13
, Issue.2
, pp. 493-527
-
-
Watts, D.J.1
-
38
-
-
85171946482
-
-
Cheng Du, China: Sichuan University
-
Xu, K., Tang, C., Ali, G., Li, C., Tang, R., & Zhu, J. (2010). A comparative study of six software packages for complex network research. Cheng Du, China: Sichuan University. http://cs.scu.edu.cn/~tangchangjie/paper_doc/2010/XKKcomparision.pdf (http://cs.scu.edu.cn/~tangchangjie/paper_doc/2010/XKKcomparision.pdf)
-
(2010)
A comparative study of six software packages for complex network research
-
-
Xu, K.1
Tang, C.2
Ali, G.3
Li, C.4
Tang, R.5
Zhu, J.6
-
39
-
-
85047692546
-
September 11 and the adaptation failure of U.S. intelligence agencies
-
Zegart, A. B. (2005). September 11 and the adaptation failure of U.S. intelligence agencies. International Security, 29(4), 78-111. http://faculty.spa.ucla.edu/zegart/pdf/29.4zegart.pdf (http://faculty.spa.ucla.edu/zegart/pdf/29.4zegart.pdf)
-
(2005)
International Security
, vol.29
, Issue.4
, pp. 78-111
-
-
Zegart, A.B.1
|