The Internet information infrastructure: Terrorist tool or architecture for information defense?
Year of publication: |
2009-11-09
|
---|---|
Authors: | Kadner, S. ; Turpen, E. ; Rees, B. |
Subject: | mathematics, computers, information science, management, law, miscellaneous | INTERNET | VULNERABILITY | USES | SABOTAGE | MITIGATION | INFORMATION DISSEMINATION |
-
Modeling Requirements for Simulating the Effects of Extreme Acts of Terrorism: A White Paper
Allen, M., (2009)
-
Maximum likelihood continuity mapping for fraud detection
Hogden, J., (2009)
-
Alternative methods of marginal abatement cost estimation: Non- parametric distance functions
Boyd, G., (2009)
- More ...
-
Gay, P.du, (1996)
-
Gay, P., (1996)
-
Mainstreaming climate change into rural development policy post 2013 : final report
Frelih-Larsen, A., (2014)
- More ...