نتایج جستجو برای: counter terrorism
تعداد نتایج: 46496 فیلتر نتایج به سال:
Terrorist group prediction using historical data of terrorist incidents has been less explored due to the lack of meticulous terrorist data which contains terrorist group’s attacks and activities information. There are many reasons for less exploration like its confidentiality & sensitivity. This paper presents an enhanced system that helps to predict the terrorist groups involved in the attack...
Prediction of terrorist group using historical data of attacks has been less explored due to the lack of detailed terrorist data which contain terrorist group's attacks and activities. The reasons may be its confidentiality & sensitivity. In this paper we have shown a terrorist group prediction model (TGPM) to predict the terrorist group involved in a given attack. This model initially lea...
In the immediate aftermath of al-Qaeda‘s September 11 attacks on the United States of America, examinations of terrorist funding focused on the Middle Eastern and South Asian use of Hawala and non-traceable financial transactions. However, whilst the cloaking of identity is certainly a part of criminal activity for funds transfer, there are other factors. South Asia‘s community banking norms al...
In this article, we investigate how the EU mobilises a spatio-temporal imaginary of “local” in its counter-radicalisation activities as means navigating subsidiarity principles and expanding remit “holistic security actor” (cf. Baker-Beall [2016]. The European Union’s fight against terrorism: discourse, policies, identity. Manchester: Manchester University Press). Extant work on EU’s terrorism ...
The purpose of this study is to understand the mechanisms behind counter-terrorism operations in Portugal, focusing particularly on its prevention framework. choice case was motivated by fact that despite having escaped major terrorist attacks period following 9/11, Portugal has, nonetheless, uphold own strategy due placement within European Union. In sense, elite interviews have been conducted...
Although practitioners have mapped the alignment between IT-related standards, this work has rarely been reported in the academic literature. In particular the methods used have not been made explicit, which has limited the value of any reported results. The research described in this paper demonstrates a rigorous method for mapping the alignment between two example IT security standards. The t...
If you get the printed book in on-line book store, you may also find the same problem. So, you must move store to store and search for the available there. But, it will not happen here. The book that we will offer right here is the soft file concept. This is what make you can easily find and get this emergent information technologies and enabling policies for counter terrorism by reading this s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید