نتایج جستجو برای: counter terrorism

تعداد نتایج: 46496  

2015
Abhishek Sachan

Terrorist group prediction using historical data of terrorist incidents has been less explored due to the lack of meticulous terrorist data which contains terrorist group’s attacks and activities information. There are many reasons for less exploration like its confidentiality & sensitivity. This paper presents an enhanced system that helps to predict the terrorist groups involved in the attack...

2012
Abhishek Sachan Devshri Roy Chris Bowerman

Prediction of terrorist group using historical data of attacks has been less explored due to the lack of detailed terrorist data which contain terrorist group's attacks and activities. The reasons may be its confidentiality & sensitivity. In this paper we have shown a terrorist group prediction model (TGPM) to predict the terrorist group involved in a given attack. This model initially lea...

2011
Michael Crowley Christopher Bolan Trish Williams Andrew Woodward Patryk Szewczyk Lisa McCormack

In the immediate aftermath of al-Qaeda‘s September 11 attacks on the United States of America, examinations of terrorist funding focused on the Middle Eastern and South Asian use of Hawala and non-traceable financial transactions. However, whilst the cloaking of identity is certainly a part of criminal activity for funds transfer, there are other factors. South Asia‘s community banking norms al...

Journal: :Bulletin of the Moscow State Regional University (Jurisprudence) 2017

Journal: :ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 2019

Journal: :European Security 2021

In this article, we investigate how the EU mobilises a spatio-temporal imaginary of “local” in its counter-radicalisation activities as means navigating subsidiarity principles and expanding remit “holistic security actor” (cf. Baker-Beall [2016]. The European Union’s fight against terrorism: discourse, policies, identity. Manchester: Manchester University Press). Extant work on EU’s terrorism ...

Journal: :Coleção Meira Mattos 2022

The purpose of this study is to understand the mechanisms behind counter-terrorism operations in Portugal, focusing particularly on its prevention framework. choice case was motivated by fact that despite having escaped major terrorist attacks period following 9/11, Portugal has, nonetheless, uphold own strategy due placement within European Union. In sense, elite interviews have been conducted...

2008
Gail Ridley Jacky Hartnett Wilumpa Jarern-Imakul

Although practitioners have mapped the alignment between IT-related standards, this work has rarely been reported in the academic literature. In particular the methods used have not been made explicit, which has limited the value of any reported results. The research described in this paper demonstrates a rigorous method for mapping the alignment between two example IT security standards. The t...

2006

If you get the printed book in on-line book store, you may also find the same problem. So, you must move store to store and search for the available there. But, it will not happen here. The book that we will offer right here is the soft file concept. This is what make you can easily find and get this emergent information technologies and enabling policies for counter terrorism by reading this s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید