Old Web
English
Sign In
Acemap
>
Paper
>
The Use of a Computerized Data Base of Terrorist Activities for Threat Assessment
The Use of a Computerized Data Base of Terrorist Activities for Threat Assessment
1989
John M. Musacchio
Arnon Rozen
Keywords:
Data collection
Terrorism
Data mining
Threat assessment
Data science
Engineering
Computer security
Correction
Source
Cite
Save
Machine Reading By IdeaReader
0
References
0
Citations
NaN
KQI
[]