National Academies Press: OpenBook
« Previous: Summary
Suggested Citation:"References." National Research Council. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version. Washington, DC: The National Academies Press. doi: 10.17226/11953.
×

References

McKenzie, K. (2001). The Rise of Asymmetric Threats: Priorities for Defense Planning. Quadrennial Defense Review. Retrieved December 13, 2006, from http://www.ndu.edu/inss/press/QDR_2001/sdcasch03.html.

O’Neil, B. E. (1990). Insurgency and Terrorism : Inside Modern Revolutionary Warfare Dulles, VA, Brassey’s Inc.

Schmid, A. P. (1988, July 25, 2006). “Definitions of Terrorism.” UN Office of Drugs and Crime, Academic Consensus Definition Retrieved July 25, 2006, from http://www.unodc.org/unodc/terrorism_definitions.html.

Wald, L. (1999). “Some Terms of Reference in Data Fusion” IEEE Transactions on Geoscience and Remote Sensing 37(3): 1190-1193.

Suggested Citation:"References." National Research Council. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version. Washington, DC: The National Academies Press. doi: 10.17226/11953.
×
Page 10
Next: Appendix A Committee Membership »
Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version Get This Book
×
Buy Paperback | $29.00 Buy Ebook | $23.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Attacks in London, Madrid, Bali, Oklahoma City and other places indicate that improvised explosive devices (IEDs) are among the weapons of choice of terrorists throughout the world. Scientists and engineers have developed various technologies that have been used to counter individual IED attacks, but events in Iraq and elsewhere indicate that the effectiveness of IEDs as weapons of asymmetric warfare remains. The Office of Naval Research has asked The National Research Council to examine the current state of knowledge and practice in the prevention, detection, and mitigation of the effects of IEDs and make recommendations for avenues of research toward the goal of making these devices an ineffective tool of asymmetric warfare. The book includes recommendations such as identifying the most important and most vulnerable elements in the chain of events leading up to an IED attack, determining how resources can be controlled in order to prevent the construction of IEDs, new analytical methods and data modeling to predict the ever-changing behavior of insurgents/terrorists, a deeper understanding of social divisions in societies, enhanced capabilities for persistent surveillance, and improved IED detection capabilities.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!