Works matching Terrorist classification
1
- Ekoloji Dergisi, 2019, n. 107, p. 153
- Bing Bu;
- Zhenyang Pi;
- Lei Wang
- Article
2
- Malaysian Journal of Computer Science, 2018, v. 31, n. 4, p. 271, doi. 10.22452/mjcs.vol31no4.3
- Mujtaba, Ghulam;
- Shuib, Liyana;
- Raj, Ram Gopal;
- Gunalan, Roshan
- Article
3
- Sustainability (2071-1050), 2019, v. 11, n. 5, p. 1487, doi. 10.3390/su11051487
- Hu, Xueli;
- Lai, Fujun;
- Chen, Gufan;
- Zou, Rongcheng;
- Feng, Qingxiang
- Article
4
- Connections (02261766), 2012, v. 32, n. 1, p. 12
- Article
5
- Administrative Law Review, 2013, v. 65, n. 2, p. 387
- Article
6
- Journal of Policing Intelligence & Counter Terrorism, 2010, v. 5, n. 2, p. 41, doi. 10.1080/18335300.2010.9686948
- Hill, Joshua;
- Miller, John M.;
- Mabrey, Daniel J.
- Article
7
- Social Forces, 2016, v. 94, n. 3, p. 1129, doi. 10.1093/sf/sov083
- Article
8
- Studies in Conflict & Terrorism, 2015, v. 38, n. 9, p. 759, doi. 10.1080/1057610X.2015.1038107
- Article
9
- Studies in Conflict & Terrorism, 2015, v. 38, n. 1, p. 39, doi. 10.1080/1057610X.2014.974400
- Ilbiz, Ethem;
- Curtis, Benjamin L.
- Article
10
- German Law Journal, 2012, v. 13, n. 9, p. 1016, doi. 10.1017/s2071832200018022
- Article
11
- Connections (18121098), 2015, v. 14, n. 4, p. 103, doi. 10.11610/Connections.14.4.09
- Article
12
- International Journal of Terrorism & Political Hot Spots, 2012, v. 7, n. 3/4, p. 263
- Rollins, John;
- Sun Wyler, Liana
- Article
13
- International Journal of Intelligence & Counterintelligence, 2018, v. 31, n. 2, p. 217, doi. 10.1080/08850607.2018.1417349
- Article
14
- American Diplomacy, 2013, p. 1
- Article
15
- Third World Quarterly, 2020, v. 41, n. 4, p. 725, doi. 10.1080/01436597.2019.1699784
- Article
16
- Journal of Vegetation Science, 2016, v. 27, n. 4, p. 704, doi. 10.1111/jvs.12400
- Lyons, Mitchell B.;
- Keith, David A.;
- Warton, David I.;
- Somerville, Michael;
- Kingsford, Richard T.;
- De Cáceres, Miquel
- Article
17
- American University Journal of Gender, Social Policy & the Law, 2018, v. 26, n. 2, p. 741
- Article
18
- Perspectives on Terrorism, 2017, v. 11, n. 4, p. 16
- Article
19
- Critical Studies on Terrorism, 2018, v. 11, n. 1, p. 151, doi. 10.1080/17539153.2017.1347238
- Article
20
- Terrorism & Political Violence, 2018, v. 30, n. 2, p. 298, doi. 10.1080/09546553.2018.1432215
- Article
21
- Middle East Policy, 2014, v. 21, n. 4, p. 45, doi. 10.1111/mepo.12094
- Article
22
- MMWR: Morbidity & Mortality Weekly Report, 2002, v. 51, p. 18
- Article
23
- Journal of Quantitative Criminology, 2020, v. 36, n. 3, p. 527, doi. 10.1007/s10940-019-09421-0
- Semmelbeck, Julia;
- Besaw, Clayton
- Article
24
- Georgia Journal of International & Comparative Law, 2019, v. 47, n. 3, p. 683
- Article
25
- International Interactions, 2018, v. 44, n. 3, p. 559, doi. 10.1080/03050629.2018.1383907
- Ramirez, Shawn L.;
- Robbins, Arianna J.
- Article
26
- Studies in Conflict & Terrorism, 2010, v. 33, n. 10, p. 933, doi. 10.1080/1057610X.2010.508511
- Jones, DavidMartin;
- Smith, M. L. R.
- Article
27
- Studies in Conflict & Terrorism, 2009, v. 32, n. 8, p. 669, doi. 10.1080/10576100903039320
- Article
28
- Accounting Review, 2022, v. 97, n. 5, p. 89, doi. 10.2308/TAR-2020-0342
- Article
29
- Firat University Journal of Engineering Science / Fırat Üniversitesi Mühendislik Bilimleri Dergisi, 2020, v. 32, n. 1, p. 267, doi. 10.35234/fumbd.643710
- ULAŞ, Mustafa;
- KARABAY, Barış
- Article
30
- Legal Research Quarterly, 2023, v. 26, n. 102, p. 113
- Article
31
- Defense & Strategy / Obrana a strategie, 2013, v. 13, n. 1, p. 31, doi. 10.3849/1802-7199.13.2013.01.031-046
- Article
32
- Hmong Studies Journal, 2020, v. 21, p. 1
- Article
34
- Lewis & Clark Law Review, 2007, v. 11, n. 4, p. 903
- Article
35
- Multimedia Tools & Applications, 2024, v. 83, n. 14, p. 42379, doi. 10.1007/s11042-023-17222-8
- Article
36
- Multimedia Tools & Applications, 2024, v. 83, n. 1, p. 1189, doi. 10.1007/s11042-023-15545-0
- Saini, Jaspal Kaur;
- Bansal, Divya
- Article
37
- Computer Modeling in Engineering & Sciences (CMES), 2024, v. 140, n. 2, p. 1427, doi. 10.32604/cmes.2023.029911
- Abdalsalam, Mohammed;
- Li, Chunlin;
- Dahou, Abdelghani;
- Kryvinska, Natalia
- Article
38
- Computer Modeling in Engineering & Sciences (CMES), 2024, v. 138, n. 2, p. 1427, doi. 10.32604/cmes.2023.029911
- Abdalsalam, Mohammed;
- Chunlin Li;
- Dahou, Abdelghani;
- Kryvinska, Natalia
- Article
39
- Military Medicine, 2012, v. 177, n. 5, p. 495, doi. 10.7205/MILMED-D-11-00363
- Chalela, Julio A.;
- Burnett, W. Thomas
- Article
40
- Critical Studies on Terrorism, 2014, v. 7, n. 3, p. 456, doi. 10.1080/17539153.2014.955308
- Article
41
- Terrorism & Political Violence, 1995, v. 7, n. 4, p. 1, doi. 10.1080/09546559508427315
- Article
42
- Relações Internacionais, 2010, n. 26, p. 83
- Article
43
- Journal of War & Culture Studies, 2014, v. 7, n. 1, p. 18, doi. 10.1179/1752628013Y.0000000008
- Kramp, Leif;
- Weichert, Stephan
- Article
44
- CounterPunch, 2024, p. 1
- Article
45
- Canadian Medical Association Journal (CMAJ), 2002, v. 167, n. 8, p. 910
- Article
46
- Law, Technology & Humans, 2025, v. 7, n. 1, p. 139, doi. 10.5204/lthj.3740
- Anwar, Tasniem;
- Klonowska, Klaudia
- Article
47
- Pragmatics & Society, 2022, v. 13, n. 3, p. 383, doi. 10.1075/ps.21018.gar
- García-Marín, Javier;
- Luengo, Óscar G.
- Article
48
- Ermeni Arastirmalari, 2017, n. 58, p. 141
- Article
49
- Brooklyn Journal of International Law, 2022, v. 48, n. 1, p. 273
- Article