Search

Showing total 608 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Topic counterterrorism Remove constraint Topic: counterterrorism Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
608 results

Search Results

1. PROLOGUE.

2. THE HAWALA SYSTEM IN THE WESTERN BALKANS: CHALLENGES AND STRATEGIES FOR COUNTERTERRORISM AND COUNTERINTELLIGENCE.

3. RISK OF TERRORISM AND ANALYSIS OF COUNTERTERRORISM CONCEPTS: A VIEWPOINT FROM SERBIA.

4. On Paper, Coalition Should Crush Islamic State.

5. CHINA'S OFFICIAL NARRATIVES ON XINJIANG: INTERETHNIC MINGLING, ECONOMIC PROSPERITY AND RELIGIOUS TERRORISM.

6. REFLEXÕES ACERCA DA LEI ANTITERROR BRASILEIRA: UMA ANÁLISE CRÍTICA ARTICULADA COM O PENSAMENTO DECOLONIAL.

7. ANALYSING 'JIHAD' RHETORIC IN THE AUSTRALIAN CONTEXT.

8. The repatriation of returning ISIS foreign terrorist fighters: Analysis of the factors influencing Indonesia's refusal and its implications on counterterrorism efforts.

9. Attention-based spatial–temporal multi-graph convolutional networks for casualty prediction of terrorist attacks.

10. Uzbekistan: A Critical Analysis of the Official Discourse on Terrorism.

11. Is there a relationship between right-wing populism and radicalisation to Islamic extremism in the UK and, if so, what is the nature of this relationship?

12. The Double-Edged Sword of Foreign Direct Investment on Domestic Terrorism.

13. THE HAWALA SYSTEM IN THE WESTERN BALKANS: CHALLENGES AND STRATEGIES FOR COUNTERTERRORISM AND COUNTERINTELLIGENCE

14. 'Boosting resilience' and 'safeguarding youngsters at risk': Critically examining the European Commission's educational responses to radicalization and violent extremism.

15. Tajikistan: An Evaluation of Terrorism and Counter-Terrorism Policies Since Independence.

16. 'Mad', bad or Muslim? The UK's Vulnerability Support Hubs and the nexus of mental health, counterterrorism and racism.

17. Does Insurgent Selective Punishment Deter Collaboration? Evidence from the Drone War in Pakistan.

18. Morals and Ethics in Counterterrorism.

19. Strange Bedfellows: Relations between International Nongovernmental Organisations and Military Actors in Preventing/Countering Violent Extremism in Northeast Nigeria.

20. The Design and Practical Implementation of a Microwave Generator - ANTITRAUL - Prototype used in Counterterrorist Missions.

21. Las sobrevivientes. Fotos, dictadura, Museos y subversión. El caso de Córdoba.

22. United States security cooperation with Kenya in the second decade of the 21st century.

23. The Prevent Duty: a proactive dispositif to manage the risk of extremism in the UK.

24. LOS TALIBÁN 2.0. DEL TERRORISMO AL CONTRATERRORISMO.

25. Perspectives on Securing the Transportation System.

26. ULNC: An Untraceable Linear Network Coding Mechanism for Mobile Devices in Wireless Mesh Networks.

27. Query the trajectory based on the precise track: a Bloom filter-based approach.

28. Solving matrix games based on Ambika method with hesitant fuzzy information and its application in the counter-terrorism issue.

29. Kosovo's Legislation and Other Mechanisms on Counterterrorism.

30. Interoperability: Enhancing Indo-Pacific Counter-Terrorism Cooperation.

31. Educating for Tolerance in Kazakhstan.

32. Non-Line-of-Sight Target Detection Based on Dual-View Observation with Single-Channel UWB Radar.

33. Multi-Source Aggregation Transformer for Concealed Object Detection in Millimeter-Wave Images.

34. Kurds: An Intersection of Unusual Alliances.

35. The Use of Structures in Communication Networks to Track Membership in Terrorist Groups.

36. Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials.

37. THE IMPACT OF FOURTH INDUSTRIAL REVOLUTION ERA ON NIGERIA'S COUNTERTERRORISM STRATEGY TOWARDS BOKO HARAM MOVEMENT.

38. ATIPRETA: AN ANALYTICAL MODEL FOR TIME–DEPENDENT PREDICTION OF TERRORIST ATTACKS.

39. The Kantian categorical imperative and Marawi refugees: Affirming the importance of the Anti-Terrorism Law.

40. The Islamic Military Alliance to Fight Terrorism: Structure, Mission, and Politics.

41. Islamic State's Financing: Sources, Methods and Utilisation.

42. Secure the Internet, one home at a time.

43. Sticks and Stones? Connecting Insurgent Propaganda with Violent Outcomes.

44. Role of Muslim Women in Countering Terrorism and Violent Extremism.

45. Detection and Classification of Finer-Grained Human Activities Based on Stepped-Frequency Continuous-Wave Through-Wall Radar.

46. Making Drones Illegal Based on a Wrong Example: The U.S. Dronified Warfare.

47. Law-Based Counterterrorism Efforts.

48. RELATIONSHIP BETWEEN SECURITY AND HUMAN RIGHTS IN COUNTER-TERRORISM: A CASE OF INTRODUCING BODY SCANNERS IN CIVIL AVIATION.

49. Rethinking direct participation in hostilities and continuous combat function in light of targeting members of terrorist non-State armed groups.

50. Terror Attacks, Panama Papers Show Cracks in Post-9/11 Monitoring.