Academic literature on the topic 'Defense against terrorism'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Defense against terrorism.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Defense against terrorism"

1

Jenkins, Brian M. "Defense Against Terrorism." Political Science Quarterly 101, no. 5 (1986): 773. http://dx.doi.org/10.2307/2150977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tumbarska, Adelina D. "The Non-Lethal Technologies Against the Terrorism." European Journal of Engineering Research and Science 3, no. 5 (2018): 41. http://dx.doi.org/10.24018/ejers.2018.3.5.729.

Full text
Abstract:
The fight against contemporary terrorism involves variety of situations in which terrorists are mixed with or are in immediate vicinity to the citizens. Use of conventional weapons in such environment often results in high levels of unintended casualties and destruction. Non-lethal technologies, having reversible effects on people, equipment and infrastructure, can significantly contribute to prevention and countering terrorist actions while minimizing collateral damage. The article is an attempt to present in a synthesized brief form the results of a several-years study on the current and potential applications of non-lethal means in the terrorist threats defense and counteraction. The capabilities of both non-lethal weapons used for decades as well as some modern solutions and emerging technologies for protection of infrastructural sites and valuable assets and in counter-terrorism operations have been considered.
APA, Harvard, Vancouver, ISO, and other styles
3

Lawless, JM, WH Gumpertz, and SW Dean. "Small-Building Defense Against Terrorism 016." Journal of ASTM International 3, no. 8 (2006): 100482. http://dx.doi.org/10.1520/jai100482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nabati, Mikael F. "Anticipatory Self-Defense: The Terrorism Exception." Current History 102, no. 664 (2003): 222–32. http://dx.doi.org/10.1525/curh.2003.102.664.222.

Full text
Abstract:
The traditional interpretation of the right of self-defense under Article 51 of the UN Charter, by prohibiting preemptive actions, gives terrorists and states sponsoring terrorist activities de facto immunity from justice and legality. Contemporary terrorist threats make the permissibility of anticipatory self-defense not only necessary, but reasonable, fair, and just. … Preemptive strikes should not be the ‘rule,’ but they may be legitimate as an exception to the charter's prohibition against the use of force.
APA, Harvard, Vancouver, ISO, and other styles
5

Tucker, Jonathan B. "Chemical/Biological Terrorism: Coping with a New Threat." Politics and the Life Sciences 15, no. 2 (1996): 167–83. http://dx.doi.org/10.1017/s073093840002270x.

Full text
Abstract:
In March 1995, Japanese terrorists released nerve gas on the Tokyo subway, causing eleven deaths and more than 5,000 injuries. Although terrorists have sought to acquire chemical/biological (C/B) agents in the past, and a few have employed them on a small scale, the Tokyo attack was the first large-scale terrorist use of a lethal chemical agent against unarmed civilians, weakening a long-standing psychological taboo. This tragic incident has therefore drawn worldwide attention to the emerging threat of chemical/biological terrorism. Despite significant technical hurdles associated with the production and delivery of C/B agents, such weapons are within the reach of terrorist groups that possess the necessary scientific know-how and financial resources. This article proposes a C/B counterterrorism strategy based on preemption and civil defense, and recommends several short-term and longer-term policy options for mitigating this emerging threat.
APA, Harvard, Vancouver, ISO, and other styles
6

Bandyopadhyay, Tridib. "Understanding Optimal Investment in Cyber Terrorism." International Journal of Cyber Warfare and Terrorism 1, no. 2 (2011): 18–34. http://dx.doi.org/10.4018/ijcwt.2011040103.

Full text
Abstract:
In this work, the author develops and explains a set of economic models under the decision theoretic framework to conceptualize the requisite levels of investment in the defense against cyber terrorism. This paper begins with a naïve model of cyber defense, on which the author progressively implements aspects of layered defense and domain conditionality to investigate practicable investment levels for countering cyber terrorism related risks. The proposed model characterizes the minimum budget below which a defending nation cannot feasibly contemplate to deploy more than one layer of defense against cyber terrorism. Beyond budgetary considerations, the paper also calculates the relative technological capabilities that the defending nation must possess to deploy a detection regime behind the first layer of protection regime. Finally, the author calculates and presents the optimal bifurcation of budget between the prevention and detection regimes should the defending nation possesses adequate funds to deploy layered defense in cyber terrorism.
APA, Harvard, Vancouver, ISO, and other styles
7

Kaufman, Whitley. "What's Wrong with Preventive War? The Moral and Legal Basis for the Preventive Use of Force." Ethics & International Affairs 19, no. 3 (2005): 23–38. http://dx.doi.org/10.1111/j.1747-7093.2005.tb00552.x.

Full text
Abstract:
The question of the legitimacy of preventive war has been at the center of the debate about the proper response to terrorism and the legitimacy of the Iraq War. One side has argued that preventive war is a legitimate and necessary tool for nations to use in defense against terrorists; the other side has claimed that war is permissible only in self-defense, and that therefore the preventive use of military force is unjustified both legally and morally. In this essay I attempt to clarify the terms of this debate by demonstrating that neither side is precisely correct. Both under Just War Doctrine and common sense morality, preventive war is indeed justifiable, so long as it satisfies the basic requirements for going to war such as necessity and proportionality. However, under the current international law regime governed by the United Nations Charter, the use of preventive international force is restricted to the Security Council alone. Individual nation states are permitted to use international force only in self-defense. The rise of international terrorism does not by itself change this situation; preventive force against terrorist organization is permissible and appropriate, but it must be authorized by the Security Council in order to be legitimate. Only if the Council proved wholly ineffective in exercising its authority would the right to preventive war revert to individual nations. For all the shortcomings of the United Nations, however, I argue we have not reached a state of total breakdown of international authority sufficient to justify a return to the legitimacy of unilateral preventive war.
APA, Harvard, Vancouver, ISO, and other styles
8

Bayu Wirayuda, Ketut. "PREVENTIVE EFFORTS ON TERRORISM CRIMINAL MANAGEMENT IN INDONESIA." Ganesha Civic Education Journal 2, no. 1 (2020): 1–8. http://dx.doi.org/10.23887/gancej.v2i1.108.

Full text
Abstract:

 
 
 Terrorism is a crime against humanity (Crime Against Humanity), and is a serious threat to the sovereignty of each country because terrorism is an international crime that poses a danger to security, world peace and detrimental to the welfare of the community needs to be done in a planned and sustainable eradication so that human rights many can be protected and held in high esteem. Terrorism has been rife in various countries including in Indonesia, many causes of terrorism in Indonesia are examples such as weak rules in Indonesia, Indonesia's defense system is also considered weak and there are those who support the occurrence of terrorism in Indonesia. In order for terrorism not to occur in Indonesia, rules must be made relating to terrorism that will cause people or perpetrators to commit acts of terrorism. Apart from its legal rules, efforts that can be done by the government are by improving the legal system or renewing the legislation system concerning terrorism and forming a body / apparatus specifically dealing with terrorism. With the establishment of a strict legal regulation, the apparatus or a strict legal entity to deal with terrorism, it is not difficult to commit terrorism in Indonesia. Many want to become terrorists in Indonesia because they are enticed by entering heaven, a luxurious life and a comfortable life in Indonesia, if the rules, legal apparatus and legal system are still weak then terrorism will be difficult to handle in Indonesia.
 
 
APA, Harvard, Vancouver, ISO, and other styles
9

Kochoi, Samvel, and Ameen Hasan. "Countering Terrorism in Iraq: Law and Practice." Всероссийский криминологический журнал 13, no. 1 (2019): 94–102. http://dx.doi.org/10.17150/2500-4255.2019.13(1).94-102.

Full text
Abstract:
After several years of fighting the international terrorist organization «Islamic State», the anti-terrorist coalitions headed by the Russian Federation and the USA managed to tip the scale in their favor in 2017. There is extensive research on how different countries counteract this most well-known of all modern international terrorist organizations. However, as Western criminologists note (Alex Braithwaite, Shane D. Johnson), there are very few empirical works that study the causes of decline and growth of terrorist activities as well as the emergence and disappearance of hot spots in Iraq itself during the American military campaign. On the whole, the overview of publications has revealed (Gary LaFree, Joshua D. Freilich) that out of over than 20 thousand articles on terrorism published between 1971 and 2004, only seven were devoted to empirical (criminological) research, while others dealt with the psychology of terrorism. The situation started to change in recent years and a large number of empirical (criminological and criminal law) studies of terrorism has been published, which is connected with the growing financial support of such research by national research foundations and state departments (for example, the Department of Homeland Security and the Department of Defense in the USA). Thus, about 100 books devoted to such studies have been annually published in the USA in the last decade. As for Russian criminal law policy, this article is one of the few devoted to countering terrorism in the motherland of «Islamic State» – in Iraq. The authors analyze Iraqi anti-terrorism legislation, in particular, Law № 13 of 2005, draw attention to an excessively wide definition of terrorism that it contains, conclude that its clause of analogy is incompatible with the principle of legality and argue that this normative act is one of the most drastic anti-terrorism laws in the world. The authors believe that an important direction in fighting terrorism is the decision of Iraqi authorities to establish a special tribunal for terrorist crimes, such as genocide against the Yazidis, and criminal prosecution of perpetrators who are outside Iraq, including those in Russian territory. They prove that the terrorist crimes against «infidels», qualified by many specialists and international organizations as crimes against peace and humanity, should mainly be the subject of proceedings in an independent court body of the international community.
APA, Harvard, Vancouver, ISO, and other styles
10

Shanduorkov, George. "Terrorism in Bulgaria." Prehospital and Disaster Medicine 18, no. 2 (2003): 66–70. http://dx.doi.org/10.1017/s1049023x00000145.

Full text
Abstract:
AbstractThe Republic of Bulgaria is one of the smallest countries in southeastern Europe and has little experience with terrorist acts. During the past 20 years, only nine terrorism-related events have been recorded in Bulgaria, and no unconventional weapons have been used. Factors contributing to terrorism in Bulgaria have been: (1) Communist Party domination of the government and political process from 1944 to 1989; (2) ethnic and religious conflicts between the Bulgarian Orthodox Christian majority and the Turkish Muslim minority from 1983 to 1987; and (3) the relatively high level of organized crime after the Communist regime ended in 1990.The structure and function of the Disaster Relief System in Bulgaria not only are focused on the prevention of terrorism, but also on preparedness for the emergency response to terrorism-related events. Institutional components of the Disaster Relief System structure responsible for the emergency response to terrorism-related events include: (1) the Government of Bulgaria; (2) the State Agency for Civil Protection with 28 regional directorates; (3) the Ministry of Health with five national hospitals, 28 regional hospitals, and 28 EMS systems; (4) the Ministry of Defense with special military units for response to unconventional terrorist events, including nuclear, biological, and chemical weapons; (5) the Ministry of Internal Affairs with 28 police departments, 28 fire departments, and specialized anti-terrorist units; and (6) the Bulgarian Red Cross.A major future challenge in Bulgaria is the prevention of terrorism through political stability, economic prosperity, ethnic and religious tolerance, and more effective measures against organized criminal activities. A related challenge will be to improve the level of preparedness of all components of Disaster Relief.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Defense against terrorism"

1

Ovdiienko, Oleksandr. "NATO's role in the protection of the civil population against the consequences of chemical, biological, radiological, and nuclear terrorist attacks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FOvdiienko.pdf.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, March 2005.<br>Thesis Advisor(s): Donald Abenheim, Maria Rasmussen. Includes bibliographical references (p. 57-60). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Berger, Michael Andrew. "How resisting democracies can defeat substate terrorism : formulating a theoretical framework for strategic coercion against nationalistic substate terrorist organizations." Thesis, St Andrews, 2010. http://hdl.handle.net/10023/889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Williamson, Myra Elsie Jane Bell. "Terrorism, war and international law: the legality of the use of force against Afghanistan in 2001." The University of Waikato, 2007. http://hdl.handle.net/10289/2594.

Full text
Abstract:
The thesis examines the international law pertaining to the use of force by states, in general, and to the use of force in self-defence, in particular. The main question addressed is whether the use of force, which was purported to be in self-defence, by the United States, the United Kingdom and their allies against al Qaeda, the Taliban and Afghanistan, beginning on 7 October 2001, was lawful. The thesis focuses not only on this specific use of force, but also on the changing nature of conflict, the definition of terrorism and on the historical evolution of limitations on the use of force, from antiquity until 2006. In the six chapters which trace the epochs of international law, the progression of five inter-related concepts is followed: limitations on the resort to force generally, the use of force in self-defence, pre-emptive self-defence, the use of forcible measures short of war, and the use of force in response to non-state actors. This historical analysis includes a particular emphasis on understanding the meaning of the 'inherent right of self-defence', which was preserved by Article 51 of the United Nations' Charter. This analysis is then applied to the use of force against Afghanistan which occurred in 2001. Following the terrorist attacks of 11 September, the US and the UK notified the United Nations Security Council of their resort to force in self-defence under Article 51. Each element of Article 51 is analysed and the thesis concludes that there are significant doubts as to the lawfulness of that decision to employ force. In addition to the self-defence justification, other possible grounds for intervention are also examined, such as humanitarian intervention, Security Council authorisation and intervention by invitation. This thesis challenges the common assumption that the use of force against Afghanistan was an example of states exercising their inherent right to self-defence. It argues that if this particular use of force is not challenged, it will lead to an expansion of the right of self-defence which will hinder rather than enhance international peace and security. Finally, this thesis draws on recent examples to illustrate the point that the use of force against Afghanistan could become a dangerous precedent for the use of force in self-defence.
APA, Harvard, Vancouver, ISO, and other styles
4

Bin, Idris Mohammad Hussin Ali. "Necessity within the legal framework of self-defence against terrorism." Thesis, University of Leeds, 2015. http://etheses.whiterose.ac.uk/13390/.

Full text
Abstract:
This thesis focuses on the criteria established for the use of force in self-defence in international law. The prohibition on the use of force in Article 2(4) of the United Nations Charter is subject to exemption by way of approval from the Security Council, or by invoking the right to self-defence. The use of force in self-defence is promulgated in Article 51 of the United Nations Charter, but is understood to be restricted by the principles of necessity and proportionality. Since the attacks in the United Stated on 11th September 2001, the law on self-defence has focused on the emergence of non-state actors within the framework of jus ad bellum. In view of this, and the contemporary context, this thesis seeks to reappraise the meaning of necessity in light of terrorism. In particular, the study asks whether the meaning of necessity is affected if self-defence is applied against a non-state actor, and if so, how. It also explores the establishment of the two conditions of self-defence, necessity and proportionality, based on the Caroline incident, and examines how the Caroline doctrine has been interpreted in the formulation of rules incorporated in jus ad bellum. The understanding of necessity in self-defence is also re-evaluated by asking the role of necessity in self-defence framework. It is argued that necessity has two important roles in self-defence law. First, it argued that necessity acts as a requirement to self-defence, specifically by seeking whether an armed attack has taken place, and if so, whether there is an alternative option to the use of non-forcible measures. Second, necessity acts as a limitation to self-defence, establishing that any defensive measures must be employed solely to achieve the legitimate aim of self-defence, which is to halt and repel an armed attack. However, it is difficult to assess necessity as a limitation on the use of force in self-defence when force is directed against terrorist groups.
APA, Harvard, Vancouver, ISO, and other styles
5

Brody, Michael H. "Contemporary jus ad bellum on use of force in self-defense by states against non-state terrorist groups-limitations, evolutions and alternatives." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5496.

Full text
Abstract:
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>International law is challenged to ensure the legal and legitimate use of force by states against non-state terrorist groups. Such groups evade easy classification as criminals or armed forces. Their organization, methods and targets are simultaneously local in application, but global in impact. They attack the foundations of state identity and legitimacy, including the monopoly on use of force, but are not state actors. Non-state actor threats are not unprecedented, but states and international law have never had to contend with non-state actors possessing global reach and force, resources and influence on par with some states, which creates a dilemma for contemporary states and jus ad bellum-to adhere to principles of international law and customs of legitimate state action, or to ensure the security of the state's citizens. The predicament is incompatible with the notion that, in the modern era, the use of force by states is to be limited, governed and made legitimate by the rule of law. State use of force without legal authorization creates severe issues of legitimacy, with politically and socially destabilizing effects. This paper examines these issues in full and identifies key trends and potential avenues for legal reform.
APA, Harvard, Vancouver, ISO, and other styles
6

Fernandes, Joana Raquel Henriques. "Qual o custo finanaceiro da projeção de uma força NATO para defesa portuária contra atques terroristas - projeto SAFEPORT." Master's thesis, 2013. http://hdl.handle.net/10400.26/12564.

Full text
Abstract:
No âmbito do desenvolvimento de um Sistema de Apoio à Decisão para Proteção Portuária contra ataques terroristas - Projeto SAFEPORT, surge a necessidade de identificar qual o custo financeiro da projeção de uma força NATO, contemplando a montagem, operação e desmontagem da força. Sendo Portugal o atual líder de um Programa de trabalho para a defesa antiterrorismo e proteção de portos não NATO – DAT PoW #2, irá ser descrito ao longo deste trabalho de investigação a constituição ótima desta equipa. Esta definição dos elementos e material necessário à missão será elaborada em função da doutrina existente na área da logística operacional, tendo por base a consulta de publicações NATO e nacionais, de modo a obter as necessidades de apoio em termos de manutenção de material e de pessoal para a realização de missões deste caráter. Irão também, ser analisados vários teatros de operações como a Guerra do Golfo, Malvinas, Afeganistão e mais recentemente a missão atribuída à MGP a EUFOR RD Congo, nos quais é percetível a complexidade de planeamento, dos quais se retiram ilações – lições aprendidas que se tornam preciosas para posteriores planeamentos logísticos à escala mundial, no âmbito da projeção de forças da Marinha. Concomitantemente, será elaborado um estudo de caso para uma projeção de uma força portuária para Mindelo e Bissau de modo a fornecer um custo associado à missão para o projeto SAFEPORT. É, ainda sugerido a elaboração de um exercício real como forma de confrontar os resultados obtidos e a atomização de material feita com base nas missões anteriores noutros países e da Marinha de Guerra Portuguesa. Toda esta investigação resultará no produto final com a construção de uma base de dados que aceite os dados necessários à execução da missão e que forneça como saída o custo da missão de um determinado cenário para contributo ao projeto SAFEPORT.<br>In the development of a Decision Support System for Port Protection against terrorist attacks - Safeport Project, the need arises to identify the financial cost of the projection of a NATO force, contemplating the installation, operation and dismantling of force. Portugal is the current leader of a work program for defense against terrorism and protection of ports not NATO - DAT PoW # 2, will be described throughout this research work the constitution of this great team. This definition of the elements and material necessary for the mission will be built around the existing doctrine in the area of operational logistics, based on consultation with NATO and national publications, in order to obtain the support needs in terms of maintenance of equipment and personnel to perform missions of this nature. Will also be analyzed various theaters of operations such as the Gulf War, Falklands, Afghanistan and more recently the task of the MGP EUFOR RD Congo, which is noticeable in the complexity of planning, of which derive lessons - lessons that become precious for further logistical schedules worldwide within the projection of naval forces. Concurrently, will produce a case study for a projection of a force to Mindelo port Bissau and to provide a cost associated with the mission to design Safeport. It also suggested the development of a real workout as a way to compare the results obtained and atomization material made based on previous missions in other countries and the Portuguese Navy. All this research will result in the final product with the construction of a database that supports the data necessary to execute the mission and to provide as output the cost of the mission of a particular contribution to the project scenario SAFEPORT.
APA, Harvard, Vancouver, ISO, and other styles
7

Williamson, Myra E. J. B. "Terrorism, war and international law the legality of the use of force against Afghanistan in 2001 /." 2007. http://adt.waikato.ac.nz/public/adt-uow20070716.103819/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

HSU, WEI-KAI, and 徐偉凱. "The Exercise of the Right of Self-defense Against Non-state Actors─In Light of Terrorist Attack." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/2bc8np.

Full text
Abstract:
碩士<br>國防大學<br>法律學系<br>105<br>Article 2, paragraph 4, of the Charter of the United Nations prohibits the use of threats or force, but states in Article 51 that the right of self-defense is a natural right of the State and can not prohibit individual or collective self-defense. The self-defense rights regulated by the Charter are attacked by the State for armed attack,It is used to defend national territory and sovereignty of their fundamental rights conferred. However, whether the exercise of the right of self-defense is confined to the state and the state is still no doubt, but for the non-state actors in recent years for the country caused by terrorist threats and conflicts, has become an international problem. According to this, the focus of this paper is to focus on the 911 terrorist attacks in the United States, to explore the 911 incident and the Islamic countries in recent years and other acts, in the international community for non-state behavior of the object of exercise for the right of self- defense?Secondly, assistance, support, or non-state actors asylum-State actors can exercise the right of self-defense? The right to exercise self-defense aforementioned study objects so that the victim is still controversial in place on the use of force. After all, all countries are using force to counter the destruction of non-state actors and prevent follow-up attacks. In this study, we can use the right of self-defense to exercise force on the premise of the damage caused by non-state actors.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Defense against terrorism"

1

Banlaoi, Rommel C. The Philippines and Australia: Defense and Security Cooperation Against Terrorism. Philippine Institute for Peace, Violence and Terrorism Research, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Legitimate use of military force against state-sponsored international terrorism. Air University Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shultz, George Pratt. U.S. government and business: Our common defense against terrorism : February 4, 1985. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shultz, George Pratt. U.S. government and business: Our common defense against terrorism : February 4, 1985. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shultz, George Pratt. U.S. government and business: Our common defense against terrorism : February 4, 1985. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Blakesley, Christopher L. Terrorism and anti-terrorism: A normative and practical assessment. Transnational Publishers, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Domestic preparedness against terrorism: How ready are we? : hearing before the Subcommittee on National Security, Veterans Affairs, and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, March 27, 2000. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

NATO Advanced Training Course on Defense Against Terrorism (2010 Amman, Jordan). Defence against terrorism. IOS Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Preparedness against terrorist attacks: Hearing before the Subcommittee on Oversight, Investigations, and Emergency Management of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Sixth Congress, first session, June 9, 1999. U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Preparedness against terrorist attacks: Hearing before the Subcommittee on Oversight, Investigations, and Emergency Management of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Sixth Congress, second session, April 6, 2000. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Defense against terrorism"

1

Madhi, Alfred. "Defense Against Terrorism." In Technology for Combating WMD Terrorism. Springer Netherlands, 2004. http://dx.doi.org/10.1007/978-1-4020-2683-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sohns, T. "Defense Against Biological Terrorism." In NBC Risks Current Capabilities and Future Perspectives for Protection. Springer Netherlands, 1999. http://dx.doi.org/10.1007/978-94-011-4641-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bologna, Mauro, Abanoub Mikhael, Ilaria Bologna, and Joseph H. Banoub. "Defense Against Biological Terrorism: Vaccines and Their Characterizations." In Toxic Chemical and Biological Agents. Springer Netherlands, 2020. http://dx.doi.org/10.1007/978-94-024-2041-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moore, D. H. "Aspects of a National Defense Against Chemical and Biological Terrorism." In Counteraction to Chemical and Biological Terrorism in East European Countries. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2342-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Watier-Grillot, Stéphanie, Olivier Cabre, Gabriel Bédubourg, Jean-Paul Demoncheaux, Christian Hupin, and Benjamin Queyriaux. "Environment and Bio-Terrorism." In Defence Against Bioterrorism. Springer Netherlands, 2018. http://dx.doi.org/10.1007/978-94-024-1263-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Agwu, Fred Aja. "Drones in Self-Defence Against Terrorists." In Armed Drones and Globalization in the Asymmetric War on Terror. Routledge, 2017. http://dx.doi.org/10.4324/9781315123936-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bologna, Mauro. "Immunological Defence Mechanisms Against Biological Agents." In Detection of Chemical, Biological, Radiological and Nuclear Agents for the Prevention of Terrorism. Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-9238-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Axelsson, A., P. Andersson, K. Elmgren, et al. "Fast neutron analysis at the Swedish Defence Research Agency (FOI)." In Detection of Bulk Explosives Advanced Techniques against Terrorism. Springer Netherlands, 2004. http://dx.doi.org/10.1007/978-94-007-0962-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"A DEFENSIVE-DENIAL STRATEGY AGAINST ROGUE STATES: National missile defense." In Deterring International Terrorism and Rogue States. Routledge, 2007. http://dx.doi.org/10.4324/9780203089002-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bhardwaj, Akashdeep, and Sam Goundar. "Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch020.

Full text
Abstract:
This article describes how cloud computing has become a significant IT infrastructure in business, government, education, research, and service industry domains. Security of cloud-based applications, especially for those applications with constant inbound and outbound user traffic is important. It becomes of the utmost importance to secure the data flowing between the cloud application and user systems against cyber criminals who launch Denial of Service (DoS) attacks. Existing research related to cloud security focuses on securing the flow of information on servers or between networks but there is a lack of research to mitigate Distributed Denial of Service attacks on cloud environments as presented by Buyya et al. and Fachkha, et al. In this article, the authors propose an algorithm and a Hybrid Cloud-based Secure Architecture to mitigate DDoS attacks. By proposing a three-tier cloud infrastructure with a two-tier defense system for separate Network and Application layers, the authors show that DDoS attacks can be detected and blocked before reaching the infrastructure hosting the Cloud applications.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Defense against terrorism"

1

Yavuz, Murat, Ali Akkas, and Yavuz Aslan. "Turboprop aircraft against terrorism: a SWOT analysis of turboprop aircraft in CAS operations." In SPIE Defense, Security, and Sensing, edited by Edward M. Carapezza. SPIE, 2012. http://dx.doi.org/10.1117/12.919419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

WOOD, LOWELL. "DEFENDING AGAINST MASS-CASUALTY TERRORISM: TECHNOLOGIES ENABLING STRATEGY AND TACTICS FOR ROBUST DEFENSE." In Proceedings of the International Seminar on Nuclear War and Planetary Emergencies — 27th Session. WORLD SCIENTIFIC, 2003. http://dx.doi.org/10.1142/9789812705150_0012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Peichl, Markus, Stephan Dill, Matthias Jirousek, and Helmut Süß. "Results and experiences from the NATO Common Shield DAT#7 experiment for the Defence Against Terrorism program." In SPIE Defense, Security, and Sensing, edited by Roger Appleby and David A. Wikner. SPIE, 2009. http://dx.doi.org/10.1117/12.820619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bannon, R., and D. Burnett. "Submarine cable infrastructure defense against terrorist aggression." In Oceans 2003. Celebrating the Past ... Teaming Toward the Future (IEEE Cat. No.03CH37492). IEEE, 2003. http://dx.doi.org/10.1109/oceans.2003.178170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kesenek, Ceylan. "Near-space airships against terrorist activities." In SPIE Defense + Security, edited by Daniel J. Henry, Davis A. Lange, Dale Linne von Berg, S. Danny Rajan, Thomas J. Walls, and Darrell L. Young. SPIE, 2014. http://dx.doi.org/10.1117/12.2053032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Kanika, Anurag Singh Chaudhary, and Parmeet Kaur. "A Machine Learning Approach for Enhancing Defence Against Global Terrorism." In 2019 Twelfth International Conference on Contemporary Computing (IC3). IEEE, 2019. http://dx.doi.org/10.1109/ic3.2019.8844947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dill, Stephan, Markus Peichl, Matthias Jirousek, and Helmut Süß. "Further analysis and evaluation of the results of the NATO common shield-DAT#7 experiment: defence against terrorism." In SPIE Europe Security + Defence, edited by Keith A. Krapels and Neil A. Salmon. SPIE, 2009. http://dx.doi.org/10.1117/12.831085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Berg, Vanessa, Jerome H. Stofleth, Dale S. Preece, and Venner Saul. "Analysis of Dynamic Loading of a Simple Structure to a Blast Wave." In ASME 2002 Pressure Vessels and Piping Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/pvp2002-1148.

Full text
Abstract:
An object in the path of a blast wave generated by an explosion will experience a certain level of structural damage. The degree of destruction seen in a structure from a explosive blast wave is effected by three main parameters, (1) the force applied to the structure, (2) how long the force is acting on the structure, and (3) the specific geometric and material properties of the structure, or architectural surety. Structures capable of large lateral loads can be used for defense against explosions (terrorist threats). However, in order to fully predict the architectural surety of a structure, further investigation of the interaction of explosive blast waves with structures is required. The purpose of our analysis is to determine the efficiency of coupling energy from a blast wave to a simple structure. We performed some explosives tests and computer simulations to provide this analysis. In our experiments, the structures consisted of several free hanging steel plates at various distances from an explosion. The blast wave was generated by a sphere of TNT. We used a standard model to calculate the overpressure incident on this plates, we then calculated the shock energy coupled to the plates, we measured the overpressure at points near the plates (for calibration), we measured the effects of the blast wave on the plates (measured their displacement due to the blast), and we performed computer code calculations to predict the effect of the blast wave on the plates. The computational code Autodyn is currently being used at Sandia National Laboratories for various impact and blast loading problems. The code contains several simulation methods, including ALE (Arbitrary Langrangian Eulerian) simulation. Because explosive blast in air involves both expanding gases as well as solid/solid impacts, ALE codes typically provide better predictive capabilities.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Defense against terrorism"

1

Firkin, Eric C., and Margaret M. McMahon. Network Centric Warfare for Coalition Integrated Defense Against Terrorism. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada466526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dochnal, A. E. The United States Homeland Defense Against International Terrorist. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada390244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography