1
Published 2009
Springer Vienna
Table of Contents: ... Mathematical Analysis of Short-term Responses to Threats of Terrorism -- Network Detection Theory...

2
by Chen, Hsinchun
Published 2006
Springer US
Table of Contents: ... -- Domestic Counter-Terrorism -- Protecting Critical Infrastructure and Key Assets -- Defending Against...

3
by Lembke, Gerald, Leipner, Ingo
Published 2020
Springer Berlin Heidelberg
Table of Contents: ...-Wahn -- Shopping-Himmel -- Digitaler Knieschuss -- Totale Überwachung -- Terror durch E-Mails...

4
by Lembke, Gerald, Leipner, Ingo
Published 2014
Springer Berlin Heidelberg
Table of Contents: ... -- Terror durch E-Mails -- Hardware-Gläubige -- Digitale Bildungswelt -- Tobender Mob im Netz -- IT-Angriff...

5
Published 2014
Springer New York
Table of Contents: ...What is 'Cyberterrorism'? Computer and Internet Technology in Legal Definitions of Terrorism...

6
Published 2009
Springer Berlin Heidelberg
Table of Contents: ..., and Other Security Products -- Internet and Web Services Security -- Cyber-attack and Cyber-terrorism...

7
Published 2020
Springer New York
Table of Contents: ... Security, Terrorism, Fraud Detection, Public Sector, Politics and Case studies -- Social Network...

8
Published 2008
Springer US
Table of Contents: ... in Predictive Behavioral Modeling -- The SOMA Terror Organization Portal (STOP): social network and analytic...

9
Published 2002
Springer US
Table of Contents: ... to Privacy, Freedom of Information and Civil Liberties in the Age of Terrorism -- National Identification...

10
Published 2002
Springer London
Table of Contents: ...: Death and Life in Virtual Worlds -- 5 30 Days in Active Worlds - Community, Design and Terrorism in a...

11
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Knowledge Reachback -- Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning...

12
Published 2014
Springer New York
Table of Contents: ... studies -- Social Network Applications in Homeland Security, Terrorism, Fraud Detection, Public Sector...

13
Published 2004
Vieweg+Teubner Verlag
Table of Contents: ... -- IT Risk Assessment -- Cybercrime and Cyber Terrorism -- Providing Cost-effective Security Functionality...

14
by Subrahmanian, V.S., Mannes, Aaron, Sliva, Amy, Shakarian, Jana
Published 2013
Springer New York
... in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda...

15
Published 2011
Springer London
Table of Contents: ... Organisational Compatible Plans Generation Framework -- A Neural Network for Counter-Terrorism S. Dixon, M. Dixon...

16
Published 2007
Vieweg+Teubner Verlag
Table of Contents: ... Security and Privacy in Addressing Crime and Terrorism on the Internet -- Data Encryption on File Servers...

17
Published 2014
Springer International Publishing
Table of Contents: ... of the Perceived Threat of Terrorism and Behavioral Responses of Terrorist Activities -- Untangling Operator...

18
Published 2009
Springer Netherlands
.... Defence Against Terrorism or Countering Other Threats to Security) and also preferably on a Partner...

19
Published 2020
Springer International Publishing
Table of Contents: ... Properties of Information Diffusion during the 2019 Halle Terror Attack on Twitter -- Cultural Factors...

20
Published 2020
Springer International Publishing
Table of Contents: ... Properties of Information Diffusion during the 2019 Halle Terror Attack on Twitter -- Cultural Factors...