Emergent Information Technologies and Enabling Policies for Counter-Terrorism

@inproceedings{Popp2006EmergentIT,
  title={Emergent Information Technologies and Enabling Policies for Counter-Terrorism},
  author={Robert L. Popp and John Yen},
  year={2006}
}
Follow up what we will offer in this article about emergent information technologies and enabling policies for counter terrorism emergent information technologies and enabling policies for counter terrorism. You know really that this book is coming as the best seller book today. So, when you are really a good reader or you're fans of the author, it does will be funny if you don't have this book. It means that you have to get this book. For you who are starting to learn about something new and… CONTINUE READING
BETA

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-4 OF 4 CITATIONS

Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias Detection

  • IEEE Transactions on Knowledge and Data Engineering
  • 2012
VIEW 2 EXCERPTS
CITES METHODS

Intelligent social network analysis using granular computing

  • Int. J. Intell. Syst.
  • 2008
VIEW 1 EXCERPT
CITES BACKGROUND

Similar Papers

Loading similar papers…