Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/sbp/BreigerAAMMRS11
%A Breiger, Ronald L.
%A Ackerman, Gary A.
%A Asal, Victor
%A Melamed, David
%A Milward, H. Brinton
%A Rethemeyer, R. Karl
%A Schoon, Eric
%B SBP
%D 2011
%E Salerno, John J.
%E Yang, Shanchieh Jay
%E Nau, Dana S.
%E Chai, Sun-Ki
%I Springer
%K dblp
%P 26-33
%T Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons.
%U http://dblp.uni-trier.de/db/conf/sbp/sbp2011.html#BreigerAAMMRS11
%V 6589
%@ 978-3-642-19655-3
@inproceedings{conf/sbp/BreigerAAMMRS11,
added-at = {2017-06-15T00:00:00.000+0200},
author = {Breiger, Ronald L. and Ackerman, Gary A. and Asal, Victor and Melamed, David and Milward, H. Brinton and Rethemeyer, R. Karl and Schoon, Eric},
biburl = {https://www.bibsonomy.org/bibtex/231ae3934c0975f64d697e7d20fa44d8a/dblp},
booktitle = {SBP},
crossref = {conf/sbp/2011},
editor = {Salerno, John J. and Yang, Shanchieh Jay and Nau, Dana S. and Chai, Sun-Ki},
ee = {https://doi.org/10.1007/978-3-642-19656-0_5},
interhash = {a1077858d4ff650c745d8d02c2b14305},
intrahash = {31ae3934c0975f64d697e7d20fa44d8a},
isbn = {978-3-642-19655-3},
keywords = {dblp},
pages = {26-33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-05-15T18:52:17.000+0200},
title = {Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons.},
url = {http://dblp.uni-trier.de/db/conf/sbp/sbp2011.html#BreigerAAMMRS11},
volume = 6589,
year = 2011
}