Effectiveness in Counter-Terrorism and Countering Violent Extremism

J Sinai, J Fuller, T Seal - Perspectives on Terrorism, 2019 - JSTOR
This Research Note is a summary of the findings of a larger literature review of more than
200 publications on what their authors consider to be Measures of Effectiveness (MoEs) in …

Benchmarking authorship attribution techniques using over a thousand books by fifty victorian era novelists

A Gungor - 2018 - search.proquest.com
Authorship attribution (AA) is the process of identifying the author of a given text and from the
machine learning perspective, it can be seen as a classification problem. In the literature …

Security economics: An adversarial risk analysis approach to airport protection

J Cano, D Ríos Insua, A Tedeschi, U Turhan - Annals of Operations …, 2016 - Springer
We analyze the case of protecting an airport, in which there is concern with terrorist threats
against the Air Traffic Control Tower. To deter terrorist actions, airport authorities rely on …

Critical networked infrastructure protection from adversaries

EG Quijano, DR Insua, J Cano - Reliability Engineering & System Safety, 2018 - Elsevier
We use the adversarial risk analysis (ARA) framework to deal with the protection of a critical
networked infrastructure from the attacks of intelligent adversaries. We deploy an ARA …

Multithreat multisite protection: A security case study

DR Insua, J Cano, M Pellot, R Ortega - European Journal of Operational …, 2016 - Elsevier
We provide a novel adversarial risk analysis approach to security resource allocation
decision processes for an organization which faces multiple threats over multiple sites. We …

[图书][B] EU foreign policy and hamas: Inconsistencies and paradoxes

A Ziadeh - 2017 - taylorfrancis.com
Shortly after the overwhelming victory of Hamas in the 2006 parliamentary and municipal
elections, civil war broke out in the Gaza Strip between members of the two factions, Hamas …

Open set authorship attribution toward demystifying Victorian periodicals

S Badirli, M Borgo Ton, A Gungor, M Dundar - Document Analysis and …, 2021 - Springer
Existing research in computational authorship attribution (AA) has primarily focused on
attribution tasks with a limited number of authors in a closed-set configuration. This restricted …

[PDF][PDF] Seguridad en las relaciones internacionales contemporáneas: una mirada para estudiantes de la disciplina

C Niño - Estudios y Tendencias de la Política y las Relaciones …, 2018 - academia.edu
¿ Cómo entender la seguridad? La seguridad es sin duda uno de los temas y conceptos
que ha logrado permear la agenda propia de las relaciones internacionales …

La paura vien twittando: Social media, terrorismo e percezione della sicurezza

M Spalletta, N Ferrigni - … : rivista quadrimestrale di scienze storiche e …, 2018 - torrossa.com
Fin dalle epoche più antiche, la paura ha rappresentato un tratto caratterizzante dell'essere
umano, poiché essa traduce la più elementare forma di insicurezza cui esso è esposto …

[PDF][PDF] Revisiting the Formation and Radicalisation of Boko Haram and Al-Qaeda in the Lands of the Islamic Maghreb (AQIM) through Social Movement Theory

KI Danguguwa, BA Hotoro, BS Kabara - ESI Preprints, 2024 - academia.edu
This paper uses social movement theory to examine the rise and development of Boko
Haram and AQIM into radical groups. Boko Haram and AQIM were initially established as …