में अनुक्रमित
  • जे गेट खोलो
  • जेनेमिक्स जर्नलसीक
  • सेफ्टीलिट
  • RefSeek
  • हमदर्द विश्वविद्यालय
  • ईबीएससीओ एज़
  • ओसीएलसी- वर्ल्डकैट
  • पबलोन्स
  • गूगल ज्ञानी
इस पृष्ठ को साझा करें
जर्नल फ़्लायर
Flyer image

अमूर्त

Applications and Modelling Using Multi-Attribute Decision Making to Rank Terrorist Threats

William P. Fox

In this paper we will examine a threat risk assessment process and modelling methodology that could be used by local law enforcement, homeland security, or military units to examine possible terrorist threats. We provide examples from a risk assessment process and a dark network. We apply different multi-attribute schemes to the threats. We also apply sensitivity analysis to the methods.