Terrorism

There is no universally agreed, legally binding, criminal law definition of terrorism. (Wikipedia.org)






Conferences related to Terrorism

Back to Top

2021 IEEE Pulsed Power Conference (PPC)

The Pulsed Power Conference is held on a biannual basis and serves as the principal forum forthe exchange of information on pulsed power technology and engineering.


Oceans 2020 MTS/IEEE GULF COAST

To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.

  • OCEANS '96

  • OCEANS '97

  • OCEANS '98

  • OCEANS '99

  • OCEANS 2000

  • OCEANS 2001

  • OCEANS 2002

  • OCEANS 2003

  • OCEANS 2004

  • OCEANS 2005

  • OCEANS 2006

  • OCEANS 2007

  • OCEANS 2008

    The Marine Technology Society (MTS) and the Oceanic Engineering Society (OES) of the Institute of Electrical and Electronic Engineers (IEEE) cosponsor a joint conference and exposition on ocean science, engineering, education, and policy. Held annually in the fall, it has become a focal point for the ocean and marine community to meet, learn, and exhibit products and services. The conference includes technical sessions, workshops, student poster sessions, job fairs, tutorials and a large exhibit.

  • OCEANS 2009

  • OCEANS 2010

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2011

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2012

    Ocean related technology. Tutorials and three days of technical sessions and exhibits. 8-12 parallel technical tracks.

  • OCEANS 2013

    Three days of 8-10 tracks of technical sessions (400-450 papers) and concurent exhibition (150-250 exhibitors)

  • OCEANS 2014

    The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2015

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2016

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 500 technical papers and 150 -200 exhibits.

  • OCEANS 2017 - Anchorage

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorials on ocean technology, workshops and town meetings on policy and governmental process.

  • OCEANS 2018 MTS/IEEE Charleston

    Ocean, coastal, and atmospheric science and technology advances and applications


OCEANS 2020 - SINGAPORE

An OCEANS conference is a major forum for scientists, engineers, and end-users throughout the world to present and discuss the latest research results, ideas, developments, and applications in all areas of oceanic science and engineering. Each conference has a specific theme chosen by the conference technical program committee. All papers presented at the conference are subsequently archived in the IEEE Xplore online database. The OCEANS conference comprises a scientific program with oral and poster presentations, and a state of the art exhibition in the field of ocean engineering and marine technology. In addition, each conference can have tutorials, workshops, panel discussions, technical tours, awards ceremonies, receptions, and other professional and social activities.

  • OCEANS 2005 - EUROPE

  • OCEANS 2006 - ASIA PACIFIC

  • OCEANS 2007 - EUROPE

    The theme 'Marine Challenges: Coastline to Deep Sea' focuses on the significant challenges, from the shallowest waters around our coasts to the deepest subsea trenches, that face marine, subsea and oceanic engineers in their drive to understand the complexities of the world's oceans.

  • OCEANS 2008 - MTS/IEEE Kobe Techno-Ocean

  • OCEANS 2009 - EUROPE

  • OCEANS 2010 IEEE - Sydney

  • OCEANS 2011 - SPAIN

    All Oceans related technologies.

  • OCEANS 2012 - YEOSU

    The OCEANS conferences covers four days with tutorials, exhibits and three days of parallel tracks that address all aspects of oceanic engineering.

  • OCEANS 2013 - NORWAY

    Ocean related technologies. Program includes tutorials, three days of technical papers and a concurrent exhibition. Student poster competition.

  • OCEANS 2014 - TAIPEI

    The OCEANS conference covers all aspects of ocean engineering from physics aspects through development and operation of undersea vehicles and equipment.

  • OCEANS 2015 - Genova

    The Marine Technology Society and the Oceanic Engineering Society of IEEE cosponsor a joint annual conference and exposition on ocean science, engineering and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 50-200 exhibits.

  • OCEANS 2016 - Shanghai

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorial on ocean technology, workshops and town hall meetings on policy and governmental process.

  • OCEANS 2017 - Aberdeen

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorials on ocean technology, workshops and town hall meetings on policy and governmental process.

  • 2018 OCEANS - MTS/IEEE Kobe Techno-Ocean (OTO)

    The conference scope is to provide a thematic umbrella for researchers working in OCEAN engineering and related fields across the world to discuss the problems and potential long term solutions that concernnot only the oceans in Asian pacific region, but the world ocean in general.

  • OCEANS 2019 - Marseille

    Research, Development, and Operations pertaining to the Oceans


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2020 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC)

All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation



Periodicals related to Terrorism

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)



Most published Xplore authors for Terrorism

Back to Top

Xplore Articles related to Terrorism

Back to Top

Fighting Cyber Terrorism: Comparison of Turkey and Russia

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018

In the 21st century computers and information technologies have rapidly developed, so now they are covering all areas of our life. And a new word and a new area were born with this trend - this is called Cyber. Cyber has brought to the world cyber attacks, which brought terrorism to this field. Now there are disputes among people about ...


Game analysis in international anti-terrorism strike

Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

In the international counter-terrorism strike, different countries have different country interests due to the influences of many factors. It leads to some bifurcation. The purpose of this paper is to study efficient measures applications of game theory to combat terror. The thesis has analyzed the international joint counter-terrorism strike restricted by different factors by applying the game theory. Our study ...


The Effectiveness of Counter-terrorism Policies Based on the Terrorism Decision

2018 37th Chinese Control Conference (CCC), 2018

Counter-terrorism policies are classified into three kinds based on the terrorism decision whether to commit terrorist acts. The policy effectiveness is probed quantitatively. We find: The early effectiveness of proactive policies is positive, while the effectiveness ceaselessly becomes weaker on the whole. Passive policies have long term effectiveness though overall effectiveness is small. The initial effectiveness of policies dealing with ...


Analyzing terrorist events in Pakistan to support counter-terrorism - Events, methods and targets

2012 International Conference of Robotics and Artificial Intelligence, 2012

This paper is the second part of our work. In the companion paper, we have highlighted the need to analyze terrorism events in Pakistan, in order to extract patterns which could provide useful information to counter terrorism authorities. We identified two different combinations for our analysis, i.e., “Terrorism Event - Terrorism Target” and “Terrorism Event - Terrorism Method”. In the ...


Analyzing terrorist incidents to support counter-terrorism - Events and methods

2012 International Conference of Robotics and Artificial Intelligence, 2012

Over the past couple of decades, Pakistan has witnessed a remarkable increase in the number of terrorist events across its major provinces. These events are not random, and to date, there exists no concrete analysis which can help us in identifying important patterns in the occurrences of these events, and provide valuable assistance to counterterrorism authorities. Our work presents the ...



Educational Resources on Terrorism

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Terrorism"

IEEE-USA E-Books

  • Fighting Cyber Terrorism: Comparison of Turkey and Russia

    In the 21st century computers and information technologies have rapidly developed, so now they are covering all areas of our life. And a new word and a new area were born with this trend - this is called Cyber. Cyber has brought to the world cyber attacks, which brought terrorism to this field. Now there are disputes among people about which attacks should be called terrorist attacks. The purpose of this study is to analyze cyber terrorism according to Turkish Law and Russian Law. In the first part of the study Russian and Turkish legislation about cyber terrorism are discussed separately. The second part contains comparison between these two countries and the conclusion.

  • Game analysis in international anti-terrorism strike

    In the international counter-terrorism strike, different countries have different country interests due to the influences of many factors. It leads to some bifurcation. The purpose of this paper is to study efficient measures applications of game theory to combat terror. The thesis has analyzed the international joint counter-terrorism strike restricted by different factors by applying the game theory. Our study show that country having terrorism shall actively join in counter-terrorism strike to cope with the terrorism in any case. Only take the joint counter-terrorism strike any country facing to the terrorism can provide the safeguard for the safety and development.

  • The Effectiveness of Counter-terrorism Policies Based on the Terrorism Decision

    Counter-terrorism policies are classified into three kinds based on the terrorism decision whether to commit terrorist acts. The policy effectiveness is probed quantitatively. We find: The early effectiveness of proactive policies is positive, while the effectiveness ceaselessly becomes weaker on the whole. Passive policies have long term effectiveness though overall effectiveness is small. The initial effectiveness of policies dealing with root causes is little. However, the significance gradually increases. Among proactive policies, the military attack functions better in the early stage compared with the politics attack, while its effectiveness becomes weaker in the later stage. Among passive policies, reinforcing the law and system is more significant than improving the embassy guard in both the short and long term.

  • Analyzing terrorist events in Pakistan to support counter-terrorism - Events, methods and targets

    This paper is the second part of our work. In the companion paper, we have highlighted the need to analyze terrorism events in Pakistan, in order to extract patterns which could provide useful information to counter terrorism authorities. We identified two different combinations for our analysis, i.e., “Terrorism Event - Terrorism Target” and “Terrorism Event - Terrorism Method”. In the companion paper, we presented some results for clustering with the Event - Target combination. In this paper, we present the remaining analysis for this combination, along with the complete analysis of the Event-Method combination.

  • Analyzing terrorist incidents to support counter-terrorism - Events and methods

    Over the past couple of decades, Pakistan has witnessed a remarkable increase in the number of terrorist events across its major provinces. These events are not random, and to date, there exists no concrete analysis which can help us in identifying important patterns in the occurrences of these events, and provide valuable assistance to counterterrorism authorities. Our work presents the first effort in this direction. We obtain a reliable database of terrorist events and implement cluster analysis with the CLOPE algorithm. We analyze clusters related to two combinations, i.e., “Terrorism Event - Terrorism Target”, and “Terrorism Event - Terrorism Method”. We annually analyze the number and content of the clusters, effectively from 2001 to 2012 and separately for each of the four major Pakistani provinces. Our work is divided in two papers. In this paper, we present some results related to the analysis of Event - Target combinations, which reveals an increase in the frequency of these combinations from 2006 onwards, particularly for the Khyber Pakhtunkhaa province. In the companion paper, we present our remaining Event-Target analyses along with the complete Event-Method analysis.

  • Research on counter-terrorism based on big data

    In the area of big data, people have a new perspective on counter-terrorism research. In this paper, we have carried out a systematic research on the applications of big data in counter-terrorism field by using quantitative analysis method. And then we have demonstrated effect of big data on counter- terrorism research from data collection and preprocessing, data mining and analysis, monitoring and warning three aspects. After that, we have used all the data of The Times and The New York Times about WUC in 2012 for analysis and argument. Finally, it concludes the deficiencies of the research on the territory of counter-terrorism by using big data and the problems worth studying in the future.

  • Construction of Fuzzy Ontology-Based Terrorism Event Extraction

    Fuzzy ontology is based on the concept that each index object is related to every other object in the ontology, with a degree of membership assigned to that relationship based on fuzzy set theory. This paper proposes use cases based on the related process of the terrorism event extraction using fuzzy ontology, especially the terrorism fuzzy ontology construction methodology. The related use cases are represented using the Web Ontology Language (OWL) which is designed to support the representation ontology relation. Additionally, to make the proposed use cases more relevant to implementing the system, the paper presents linguistic variables which serve as a mean of approximate characterization of fuzzy phenomena concepts and also the appropriate characterization of the terrorism fuzzy relations in their properties.

  • An interdisciplinary approach to studying and improving terrorism analysis

    The analysis of terrorism information requires sound human judgment amplified by well-integrated technical capabilities in the context of an intelligence mission. To that end, we present the first phase of our work to establish a methodology suitable for the study of terrorism analysis. We present an interdisciplinary approach built on a synthesis of engineering, cognitive, and mission perspectives that is intended to double the analytic capacity of a typical analyst. Our research methodology is based on the concept of analytic exercises, in which subjects function as analysts solving complex, realistic terrorism problems. The data we collect is used to identify effective work patterns and inform the design of analytic tools that overcome cognitive impediments to high-quality analysis.

  • Counter terrorism functions to enhance critical infrastructure resilience against CBRNe terrorism

    Current approaches in critical infrastructure protection use long lists of items that fail to give its user a structured answer to the state of protection of its object. The functionality approach uses different terrorist functions to structure the threat (which are to have intent, to scout, to transport, to attack and to have an effect). It uses four different counter terrorist functions (to deter, to detect, to mitigate and to respond) to disturb and counter these terrorist functions.

  • Implementation of Intelligent Searching Using Self-Organizing Map for Webmining Used in Document Containing Information in Relation to Cyber Terrorism

    The terrorism activities are not only in real world as development of technology, but also in cyber world. Terrorism activities in cyber world are called cyber terrorism. One of methodology for cyber terrorism detection is by applying data mining algorithm to textual content of terrorism related web pages. Web mining is technology applied to extract information from the web. By using web mining, cyber terrorism information will be collected from internet. This research aims to use text cluster technique, by which the web documents are clustered using Self-Organizing Map algorithm based on number of occurrences of the certain words in documents that have relevance to cyber terrorism. The result shows mapping of the clustered documents that have performance 6.1 and 22.75 in term of vector quantization error (VQE). According this result, we concluded that Self-Organizing Map (SOM) is able to visualizethe topology of the data, by converting statistical relationship among the data into simple geometrical relationship of their image points in 2-dimensional grid.



Standards related to Terrorism

Back to Top

No standards are currently tagged "Terrorism"