Showing 41 - 60 results of 158 for search '"terrorist"', query time: 0.04s Refine Results
  1. 41

    Cyberterrorism: content, forms and promising countermeasures by D. S. Melnyk

    Published 2023-10-01
    “…This type of terrorism should be regarded as a socially dangerous politically motivated activity aimed at disrupting the critical information infrastructure of the State and thus creating a danger to human life and health or causing other serious consequences, provided that such actions were committed for terrorist purposes, or using cyberspace for other purposes of terrorist activities not directly related to terrorist acts. …”
    Get full text
    Article
  2. 42

    “Yeni Terörizm”in Geleceğin Güvenlik Ortamına Etkileri: Daeş Örneği by Selim KURT

    Published 2019-12-01
    “…There is no doubt that the terrorist attack carried out by the nineteen Al-Qaida militants against the United States on September 11, 2001 was a complete breaking point for terrorism. …”
    Get full text
    Article
  3. 43

    Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism by A. Yu. Helzhynskyi

    Published 2019-09-01
    “…The relevance of the research is determined by the prerequisites for the rise in the levels of terrorist threats in Ukraine and the development of international terrorism. …”
    Get full text
    Article
  4. 44

    Terrorismo extremo e os tensionamentos nas democracias by Hugo Arend

    Published 2005-01-01
    “…How can we relate the conflicts that emerge in the midst of big cities after terrorist attacks and the problems faced by Western democracies? …”
    Get full text
    Article
  5. 45

    Radicalization and Counter-Radicalization on the Internet (Roles and Responsibilities of Stakeholders in Countering Cyber Terrorism) by Raharjo Agus, Hapsari Retnaningrum Dwi, Sugeng Esmara, Saefudin Yusuf, Ismail Noorfajri

    Published 2025-01-01
    “…This article discusses how terrorists/terrorist organizations use the internet to carry out their actions; the roles and responsibilities of stakeholders in countering cyberterrorism. …”
    Get full text
    Article
  6. 46

    Detection of Jihadism in Social Networks Using Big Data Techniques Supported by Graphs and Fuzzy Clustering by Cristina Sánchez-Rebollo, Cristina Puente, Rafael Palacios, Claudia Piriz, Juan P. Fuentes, Javier Jarauta

    Published 2019-01-01
    “…Social networks are being used by terrorist organizations to distribute messages with the intention of influencing people and recruiting new members. …”
    Get full text
    Article
  7. 47

    How do events shape the media agenda on Islam and Muslims in Western Europe? An analysis of news events in Germany, the UK and France (2000–2020) by Liriam Sponholz, Anna-Maria Meuth

    Published 2025-01-01
    “…The results show that media attention on Islam and Muslims is highly unevenly distributed and concentrated in the aftermath of single terrorist attacks, rather than on religiously motivated terrorist attacks in general. …”
    Get full text
    Article
  8. 48

    Structural Response to Blast Loading: The Effects of Corrosion on Reinforced Concrete Structures by Hakan Yalciner

    Published 2014-01-01
    “…Structural blast design has become a necessary part of the design with increasing terrorist attacks. Terrorist attacks are not the one to make the structures important against blast loading where other explosions such as high gas explosions also take an important place in structural safety. …”
    Get full text
    Article
  9. 49

    A Study on Nash-Collative Differential Game of N-Players for Counterterrorism by Mohamed Abd El-Hady Kassem, Abd El-Monem A. Megahed, Hebatallah K. Arafat

    Published 2021-01-01
    “…In this work, by using the Nash-collative approach for a differential game problem between N-governments and terrorist organizations, we study governments’ cooperation and the role of each government for counterterrorism. …”
    Get full text
    Article
  10. 50

    Access Control Points: Reducing a Possible Blast Impact by Meandering by Martin Larcher, Georgios Valsamos, Vasilis Karlos

    Published 2018-01-01
    “…In response to the heightened terror threat in recent years, there is an increasing interest in the introduction of access control zones at sites that are characterized by an increased likelihood of being the target of a terrorist attack, as latest data reveal that unprotected areas of mass congregation of people have become attractive to terrorist groups. …”
    Get full text
    Article
  11. 51

    Legitimacy of Social Justice in the Terrorism Regulations: Insight from Several Countries by Ali Masyhar, Rohadhatul Aisy, Akhmedova Mehrinigor Bahodirovna, Gaini Mukhanova

    Published 2024-07-01
    “…Second, it is critical to compare other countries' terrorism regulations to understand and evaluate their strategies for enhancing international cooperation and preventing terrorist attacks. In response to persistent terrorist threats, the United Kingdom, Pakistan, and the European Union implemented more ambitious counterterrorism strategies and incorporated social justice into their policies. …”
    Get full text
    Article
  12. 52

    Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier by Wasi Haider Butt, M. Usman Akram, Shoab A. Khan, Muhammad Younus Javed

    Published 2014-01-01
    “…Our system also applies anomaly detection to predict any terrorist activity in order to help law enforcement agencies to destabilize the involved network. …”
    Get full text
    Article
  13. 53

    Damage Assessment of an RC Pier under Noncontact Blast Loading Based on P-I Curves by Lu Liu, Zhouhong Zong, Biao Tang, Minghong Li

    Published 2018-01-01
    “…Since the 9.11 attacks in New York, terrorist attacks, military strikes, and accidental explosions have caused serious damage to various infrastructures around the world. …”
    Get full text
    Article
  14. 54

    Being proactive about media engagement in first aid education

    Published 2019-02-01
    “…Having used Google Analytics to monitor the correlation between first aid phone app usage spikes and external media events such as news reports of terrorist attacks and popular shows featuring medical emergencies in their content, the conference explores the potential of appropriately utilizing media engagement to various ends based on timing, circumstance, and locational proximity.…”
    Get full text
    Article
  15. 55

    Globalization, Security and Governance Challenges in Nigeria by WILSON SIMON OKWOLI, LAMI LENTON ANUGA, JOSEPH ABOGENYE ANUGA

    Published 2024-09-01
    “…That is a defining attribute of terrorist organizations that are active in Nigeria with their international links. …”
    Get full text
    Article
  16. 56

    Methods Used in Urban Search and Rescue in Disasters and Evaluation of Current Approaches by Gürkan Yılmaz, Sevda Demiröz Yıldırım

    Published 2020-01-01
    “…Disaster is an event that results in serious physical and death of large number of people, because of earthquake, tsunami, flood, landslide, volcano eruption, hurricane, hose, airplane accidents, train accidents, nuclear power plant accidents, explosions and terrorist attacks. Urban search and rescue works are important for finding people and animals trapped under the collapsed structure after the collapse of buildings as a result of earthquakes, terrorist attacks and landslides. …”
    Get full text
    Article
  17. 57

    Political propaganda of the radical Islamic organizations in the USA by I. A. Istomin

    Published 2012-12-01
    “…Participation of American citizens in dissemination of Jihadist publications and funding of illegal organizations as well as involvement in terrorist acts proves practical effect of these activities.…”
    Get full text
    Article
  18. 58

    War and criminal law policy of Ukraine: challenges and responses by Yu. V. Orlov, N. O. Pribytkova

    Published 2022-06-01
    “…The possibility of the coexistence of the phenomena of terrorism and aggressive war, the presence of signs of war crimes and terrorist acts in the actions of combatants has been proven. …”
    Get full text
    Article
  19. 59

    Facing Terrorism Alone by Carolyn S. Wilken

    Published 2003-06-01
    “…We worry about the possibility of another terrorist attack. We feel stressed because we don’t know what to expect from day to day. …”
    Get full text
    Article
  20. 60

    Facing Terrorism Alone by Carolyn S. Wilken

    Published 2003-06-01
    “…We worry about the possibility of another terrorist attack. We feel stressed because we don’t know what to expect from day to day. …”
    Get full text
    Article