Search

Your search keyword '"Kantor P"' showing total 117 results

Search Constraints

Start Over You searched for: Author "Kantor P" Remove constraint Author: "Kantor P" Publication Type Books Remove constraint Publication Type: Books
117 results on '"Kantor P"'

Search Results

1. Vocationalism Reconsidered.

2. Studying Children in Context: Theories, Methods, and Ethics.

3. Constricted Terrain: Jonathan Kozol, the Left, and the Possibilities of Educational Reform.

4. The Adaptive Network Library Interface: A Historical Overview and Interim Report.

7. Distributed Search and Rescue with Robot and Sensor Teams.

8. Imaging Intramyocardial Microcirculatory Function Using Fast Computed Tomography.

9. Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.

10. The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events.

11. The Qualitative Challenge of Insurgency Informatics.

12. Forecasting Terrorist Groups' Warfare: ‘Conventional' to CBRN.

13. Forecasting Terrorism: Indicators and Proven Analytic Techniques.

14. A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems.

15. Connections in the World of International Terrorism.

16. Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.

17. Computational Tool in Infrastructure Emergency Total Evacuation Analysis.

18. CODESSEAL: Compiler/FPGA Approach to Secure Applications.

19. Biomonitoring, Phylogenetics and Anomaly Aggregation Systems.

20. Map-Mediated GeoCollaborative Crisis Management.

21. A Jackson Network-Based Model for Quantitative Analysis of Network Security.

22. Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation.

23. The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level.

24. Intrusion Detection System Using Sequence and Set Preserving Metric.

25. An Ontological Approach to the Document Access Problem of Insider Threat.

26. Active Automation of the DITSCAP.

27. Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.

28. Deception Across Cultures: Bottom-Up and Top-Down Approaches.

29. Data Distortion for Privacy Protection in a Terrorist Analysis System.

30. A Survey of Software Watermarking.

31. Thematic Indicators Derived from World News Reports.

32. A Novel Watermarking Algorithm Based on SVD and Zernike Moments.

33. How Question Answering Technology Helps to Locate Malevolent Online Content.

34. Information Supply Chain: A Unified Framework for Information-Sharing.

35. Evaluating an Infectious Disease Information Sharing and Analysis System.

36. Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.

37. Some Marginal Learning Algorithms for Unsupervised Problems.

38. LSI-Based Taxonomy Generation: The Taxonomist System.

39. Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.

40. Efficient Discovery of New Information in Large Text Databases.

41. Discovering Identity Problems: A Case Study.

42. Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.

43. Testing a Rational Choice Model of Airline Hijackings.

44. Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.

45. Measuring Success in Countering Terrorism: Problems and Pitfalls.

46. A Conceptual Model of Counterterrorist Operations.

47. Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.

48. A New Conceptual Framework to Resolve Terrorism's Root Causes.

49. Selective Fusion for Speaker Verification in Surveillance.

50. Modeling and Multiway Analysis of Chatroom Tensors.

Catalog

Books, media, physical & digital resources