نتایج جستجو برای: terrorist groups

تعداد نتایج: 732772  

Journal: :I. J. Network Security 2006
Mark Jyn-Huey Lim Michael Negnevitsky Jacky Hartnett

Within the area of criminal and terrorist social network analysis, there is little research being done on analysing the communication behavior of criminal and terrorist groups. In this paper, we describe the development of a conceptual simulation model of the e-mail system, which is based on the use of personality trait dimensions to model the e-mail traffic behavior of e-mail users. This conce...

Journal: :Risk analysis : an official publication of the Society for Risk Analysis 2017
Gary A Ackerman Jun Zhuang Sitara Weerasuriya

This article uses a game-theoretic approach to analyze the risk of cross-milieu terrorist collaboration-the possibility that, despite marked ideological differences, extremist groups from very different milieus might align to a degree where operational collaboration against Western societies becomes possible. Based upon theoretical insights drawn from a variety of literatures, a bargaining mode...

2005
Aaron Mannes Jennifer Golbeck

The Semantic Web could be a crucial tool to terrorism researchers, but to achieve this potential an accessible and flexible but comprehensive ontology needs to be designed to describe terrorist activity. Terrorist events are complicated phenomena that involve a large variety of situations and relationships. This paper addresses some of the issues the authors have encountered trying to build suc...

2017
Sébastien Gambs Marc-Olivier Killijian Cédric Lauradoux Cristina Onete Matthieu Roy Moussa Traoré

Terrorist fraud is a class of relay attacks against distancebounding (DB) protocols in which a distant malicious prover colludes with an attacker located in a verifier’s proximity when authenticating. Existing DB protocols resisting such attacks are designed to be lightweight and thus symmetric, relying on a secret shared by the prover and the verifier. Recently, several asymmetric distance-bou...

Journal: :Decision Analysis 2011
Kjell Hausken Jun Zhuang

W analyze how a government allocates its resources between attacking to downgrade a terrorist’s resources and defending against a terrorist attack. Analogously, the terrorist allocates its resources between attacking a government’s asset and defending its own resources. A two-stage game is considered where the government moves first and the terrorist moves second. We show that (a) when the terr...

Journal: :CLCWeb: Comparative Literature and Culture 2007

Journal: :Optik & Photonik 2007

Journal: :Annual Review of Political Science 2003

2017
James J.F. Forest

This article examines theories of practical and strategic constraints that collectively explain why so few terrorist groups in history have crossed (or attempted to cross) the WMD threshold. From this analysis, it becomes clear that a terrorist group's deliberations about WMD can be influenced (positively or negatively) by a variety of factors. Our projections of the future WMD terrorism threat...

2017
BRUNO S. FREY

Many governments as well as terrorist experts see the use of military and police forces as the only way to effectively counter terrorism. The most effective negative sanctions are considered to be military strikes, aggressive actions (including kidnapping and killing) against individuals known or suspected of being terrorists, or against persons supporting and harboring terrorists. Overt and co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید