REFERENCES

Bale, Jeffrey M. 2007. Some Preliminary Observations on Jihadist Operations in Europe. In Workshop on Determining a Research Agenda for Disrupting IED Terror Campaigns: Finding the Weak Links. Irvine, CA.

Blasch, Erik P., and Susan Plano. 2003. Level 5: User Refinement to Aid the Fusion Process. Paper read at Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2003, at Orlando, FL.

Carter, Kevin M., Raviv Raich, and Alfred O. III Hero. 2007. Debiasing for Intrinsic Dimension Estimation. Paper read at Proc. IEEE Statistical Signal Processing Workshop (SSP).

Endsley, Mica R. 1995. Toward a Theory of Situation Awareness in Dynamic Systems. Human Factors 37 (1):32-64.

Fair, Christine. 2007. Suicide Attacks in Afghanistan. Place Published: United Nations Assistance Mission to Afghanistan. http://www.unama-afg.org/docs/_UN-Docs/UNAMA%20-%20SUICIDE%20ATTACKS%20STUDY%20-%20SEPT%209th%202007.pdf (accessed May 28, 2008).

Feldhoff, R., C. A. Saby, and P. Bernadet. 1999. Discrimination of diesel fuels with chemical sensors and mass spectrometry based electronic noses. Analyst 124 (8):1167-1173.

Hero, Alfred O. III. 2007. Geometric entropy minimization (GEM) for anomaly detection and localization. In Advances in Neural Information Processing Systems 19, edited by B. Schoelkopf, J. Platt and T. Hoffman. Cambridge, MA: MIT Press.

Iyengar, Satish G, Pramod K Varshney, and Thyagaraju Damarla. 2007. On the Detection of Footsteps Based on Acoustic and Seismic Sensing. Paper read at Proc. of 41st Annual Asilomar Conference on Signals, Systems and Computers, at Pacific Grove, CA.

Johnson, Neil F. 2006. The Mother (Nature) of All Wars? Modern Wars, Global Terrorism, and Complexity Science. APS News.

———. 2008. Common Complexity Underlying Insurgent Wars and Terrorism: A Contribution to the Workshop on Disrupting IED Terror Campaigns. In Workshop on Disrupting IED Terror Campaigns: Finding the Weak Links. Irvine, CA: The National Academies.

Justice, Derek, and Alfred O. III Hero. 2006. Estimation of Message Source and Destination from Link Intercepts. IEEE Transactions on Information Forensics and Security 1 (3):374-385.

Kenney, Michael. 2006. From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation. University Park, PA: Pennsylvania State University Press.

Meigs, Montgomery. 2003. Unorthodox Thoughts about Asymmetric Warfare. Parameters 33 (2):4-18.

National Research Council. 1998. Containing the Threat from Illegal Bombings: An Integrated National Strategy for Marking, Tagging, Rendering Inert, and Licensing Explosives and Their Precursors. Washington, DC: The National Academies.



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement



Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.

OCR for page 53
REFERENCES Bale, Jeffrey M. 2007. Some Preliminary Observations on Jihadist Operations in Europe. In Workshop on Determining a Research Agenda for Disrupting IED Terror Campaigns: Finding the Weak Links. Irvine, CA. Blasch, Erik P., and Susan Plano. 2003. Level 5: User Refinement to Aid the Fusion Process. Paper read at Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2003, at Orlando, FL. Carter, Kevin M., Raviv Raich, and Alfred O. III Hero. 2007. Debiasing for Intrinsic Dimension Estimation. Paper read at Proc. IEEE Statistical Signal Processing Workshop (SSP). Endsley, Mica R. 1995. Toward a Theory of Situation Awareness in Dynamic Systems. Human Factors 37 (1):32-64. Fair, Christine. 2007. Suicide Attacks in Afghanistan. Place Published: United Nations Assistance Mission to Afghanistan. http://www.unama-afg.org/docs/_UN- Docs/UNAMA%20-%20SUICIDE%20ATTACKS%20STUDY%20- %20SEPT%209th%202007.pdf (accessed May 28, 2008). Feldhoff, R., C. A. Saby, and P. Bernadet. 1999. Discrimination of diesel fuels with chemical sensors and mass spectrometry based electronic noses. Analyst 124 (8):1167-1173. Hero, Alfred O. III. 2007. Geometric entropy minimization (GEM) for anomaly detection and localization. In Advances in Neural Information Processing Systems 19, edited by B. Schoelkopf, J. Platt and T. Hoffman. Cambridge, MA: MIT Press. Iyengar, Satish G, Pramod K Varshney, and Thyagaraju Damarla. 2007. On the Detection of Footsteps Based on Acoustic and Seismic Sensing. Paper read at Proc. of 41st Annual Asilomar Conference on Signals, Systems and Computers, at Pacific Grove, CA. Johnson, Neil F. 2006. The Mother (Nature) of All Wars? Modern Wars, Global Terrorism, and Complexity Science. APS News. ———. 2008. Common Complexity Underlying Insurgent Wars and Terrorism: A Contribution to the Workshop on Disrupting IED Terror Campaigns. In Workshop on Disrupting IED Terror Campaigns: Finding the Weak Links. Irvine, CA: The National Academies. Justice, Derek, and Alfred O. III Hero. 2006. Estimation of Message Source and Destination from Link Intercepts. IEEE Transactions on Information Forensics and Security 1 (3):374-385. Kenney, Michael. 2006. From Pablo to Osama: Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation. University Park, PA: Pennsylvania State University Press. Meigs, Montgomery. 2003. Unorthodox Thoughts about Asymmetric Warfare. Parameters 33 (2):4-18. National Research Council. 1998. Containing the Threat from Illegal Bombings: An Integrated National Strategy for Marking, Tagging, Rendering Inert, and Licensing Explosives and Their Precursors. Washington, DC: The National Academies. 53

OCR for page 53
———. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities (Abbreviated Version). Washington, DC: The National Academies Press. Pardo, M., B. C. Sisk, G. Sberveglieri, and N. S. Lewis. 2006. Comparison of Fisher's linear discriminant to multilayer perceptron networks in the classification of vapors using sensor array data. Sensors and Actuators, B: Chemical 115 (2):647- 655. The Quest for Viable Peace: International Intervention and Strategies for Conflict Transformation. 2005. Edited by J. Covey, M. J. Dziedzic and L. R. Hawley. Washington, DC: United States Institute of Peace Press. Rabbat, Michael G., Mario A.T. Figueiredo, and Robert D. Nowak. 2006. Inferring Network Structure from Co-Occurrences. Paper read at Neural Information Processing Systems ———. 2007. Genomic Network Tomography. In IEEE International Conference on Acoustics, Speech, and Signal Processing. Honolulu. Rabbat, Michael G., John R. Treichler, Sally L. Wood, and Michael G. Larimore. 2005. Understanding the Topology of a Telephone Network via Internally-Sensed Network Tomography. In IEEE International Conference on Acoustics, Speech, and Signal Processing. Philadelphia, PA. Silber, Mitchell D., and Arvin Bhatt. 2007. Radicalization in the West and the Homegrown Threat, edited by New York City Police Department Intelligence Division. New York City. Smith, Michael J., and Anuj Srivastava. 2004. A Bayesian Framework for Statistical Multi-Modal Sensor Fusion. Paper read at Proceedings of US Army Conference on Applied Statistics, at Atlanta, GA. Xiaotao, Zou, and Bhanu Bir. 2005. Tracking Humans using Multi-modal Fusion. In Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops - Volume 03: IEEE Computer Society. 54