Handbook of Computational Approaches to Counterterrorism More Books Like This

Counterterrorism and Open Source Intelligence Counterterrorism and Open Source Intelligence
2011
Social Computing, Behavioral Modeling, and Prediction Social Computing, Behavioral Modeling, and Prediction
2008
Social Computing, Behavioral-Cultural Modeling and Prediction Social Computing, Behavioral-Cultural Modeling and Prediction
2011
Intelligent Systems for Security Informatics Intelligent Systems for Security Informatics
2013
Security Informatics Security Informatics
2010
Social, Cultural, and Behavioral Modeling Social, Cultural, and Behavioral Modeling
2020
Information Systems for Crisis Response and Management in Mediterranean Countries Information Systems for Crisis Response and Management in Mediterranean Countries
2015
Adversary-Aware Learning Techniques and Trends in Cybersecurity Adversary-Aware Learning Techniques and Trends in Cybersecurity
2021
Social, Cultural, and Behavioral Modeling Social, Cultural, and Behavioral Modeling
2017
Social, Cultural, and Behavioral Modeling Social, Cultural, and Behavioral Modeling
2021
Graphical Models for Security Graphical Models for Security
2019
Social, Cultural, and Behavioral Modeling Social, Cultural, and Behavioral Modeling
2019
Cyber Warfare Cyber Warfare
2015
Graphical Models for Security Graphical Models for Security
2016
ECML PKDD 2018 Workshops ECML PKDD 2018 Workshops
2019