Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Profiling and Behavioral Analysis“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Profiling and Behavioral Analysis" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Profiling and Behavioral Analysis"
FINTZY, ROBERT T. „Criminal Profiling: An Introduction to Behavioral Evidence Analysis“. American Journal of Psychiatry 157, Nr. 9 (September 2000): 1532–34. http://dx.doi.org/10.1176/appi.ajp.157.9.1532.
Der volle Inhalt der QuelleMartineau, Melissa, Elena Spiridon und Mary Aiken. „A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature“. Forensic Sciences 3, Nr. 3 (22.07.2023): 452–77. http://dx.doi.org/10.3390/forensicsci3030032.
Der volle Inhalt der QuelleYu, Szde. „BEHAVIORAL EVIDENCE ANALYSIS ON FACEBOOK: A TEST OF CYBER-PROFILING“. Defendologija 16, Nr. 33 (10.05.2013): 19–30. http://dx.doi.org/10.5570/dfnd.en.1333.02.
Der volle Inhalt der QuelleLi, Hai, Luke Lunhua Mao, James Jianhui Zhang und Jiaxi Xu. „Classifying and Profiling Sports Lottery Gamblers: A Cluster Analysis Approach“. Social Behavior and Personality: an international journal 43, Nr. 8 (18.09.2015): 1299–317. http://dx.doi.org/10.2224/sbp.2015.43.8.1299.
Der volle Inhalt der QuelleHarini, Karthick, Suliman Yousef Alomar, Mohammed Vajagathali, Salim Manoharadas, Anbazhagan Thirumalai, Koyeli Girigoswami und Agnishwar Girigoswami. „Niosomal Bupropion: Exploring Therapeutic Frontiers through Behavioral Profiling“. Pharmaceuticals 17, Nr. 3 (12.03.2024): 366. http://dx.doi.org/10.3390/ph17030366.
Der volle Inhalt der QuelleSABUNCU, Ä°brahim, Edanur TÃœRKAN und Hilal POLAT. „CUSTOMER SEGMENTATION AND PROFILING WITH RFM ANALYSIS“. TURKISH JOURNAL OF MARKETING 5, Nr. 1 (25.04.2020): 22–36. http://dx.doi.org/10.30685/tujom.v5i1.84.
Der volle Inhalt der Quellevon Ziegler, Lukas, Oliver Sturman und Johannes Bohacek. „Big behavior: challenges and opportunities in a new era of deep behavior profiling“. Neuropsychopharmacology 46, Nr. 1 (29.06.2020): 33–44. http://dx.doi.org/10.1038/s41386-020-0751-7.
Der volle Inhalt der QuelleAdeyiga, J. A., S. O. Olabiyisi und E. O. Omidiora. „A comparative analysis of selected clustering algorithms for criminal profiling“. Nigerian Journal of Technology 39, Nr. 2 (16.07.2020): 464–71. http://dx.doi.org/10.4314/njt.v39i2.16.
Der volle Inhalt der QuelleCantore, Daniele. „On Biometrics and Profiling“. International Journal of Technoethics 2, Nr. 4 (Oktober 2011): 84–93. http://dx.doi.org/10.4018/jte.2011100106.
Der volle Inhalt der QuelleTrusov, Michael, Liye Ma und Zainab Jamal. „Crumbs of the Cookie: User Profiling in Customer-Base Analysis and Behavioral Targeting“. Marketing Science 35, Nr. 3 (Mai 2016): 405–26. http://dx.doi.org/10.1287/mksc.2015.0956.
Der volle Inhalt der QuelleDissertationen zum Thema "Profiling and Behavioral Analysis"
Lane, Erin C. „Urban disadvantage, social disorganization, and racial profiling an analysis of ecology and police officers' race-specific search behaviors /“. [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012660.
Der volle Inhalt der QuelleSchmidt, Elisabeth. „Profiling the german Gazela vinho verde consumer: a market segmentation based on product quality“. Master's thesis, [s.n.], 2013. http://hdl.handle.net/10284/4105.
Der volle Inhalt der QuelleThe core objective of this study was to find out what preferences and wine consumer patterns characterize specific segments in the German market for Vinho Verde. For this purpose an exploratory research using a self-administered questionnaire was applied. The basis for a cluster analysis was a measurement scale about the perceived product quality of Gazela. Four segments were derived from the cluster analysis: (1) refusing, (2) enthusiastic, (3) indifferent and (4) enjoying Vinho Verde drinker. The second and the fourth segments were found to be the main target groups for Gazela. The findings about the associations between Portugal as the country of origin of Gazela and Portuguese wine were rather negative. The managerial implications suggest developing an advertising campaign in order to successfully promote Gazela in Germany. Two alternatives are suggested: keeping the country of origin on the label or removing it. The first suggestion requires extensive measures and actions to improve the image of wine, which is “made in Portugal”. The results of this study show the need of increasing the awareness of Vinho Verde among German consumers and indicate the need of improvement of the perceptions about Portugal and Portuguese wine and examine possibilities for enhancing the acceptance of Portuguese wine, especially Vinho Verde in Germany.
O objetivo principal deste estudo foi o de descobrir as preferências e os padrões de consumo de vinho que caracterizam os segmentos específicos do mercado alemão para o Vinho Verde. Para este objectivo esta pesquisa exploratória utilizou um questionário auto-administrado. A escala base escolhida para a análise de cluster foi a de medição sobre a qualidade do produto percebida aplicada à marca Gazela. Foram obtidos quatros segmentos a partir da análise de cluster: (1) Objector (2), entusiasta, (3) indiferente e (4) Fruidor de Vinho Verde. Os segmentos 2 e 4 são os grupos alvos de Gazela. Os resultados sobre as associações com Portugal, o país de origem do Gazela, e vinho português demostraram relações bastante negativas. As implicações ao nível da gestão sugerem o desenvolvimento de uma campanha publicitária para promover o sucesso de Gazela na alemanha. Duas alternativas são sugeridas: manter o país de origem no rótulo ou removê-lo. A primeira sugestão requer medidas e ações mais abrangentes para melhorar a imagem do vinho "made in Portugal". Os resultados deste estudo apontam para a necessidade de aumentar a consciência sobre o Vinho Verde entre os consumidores alemães e indicam a necessidade de melhoria das percepções sobre Portugal e sobre o vinho português e de estudar as possibilidades de aumentar a aceitação de vinho português, especialmente o Vinho Verde na Alemanha.
Yan, Dacong. „Program Analyses for Understanding the Behavior and Performance of Traditional and Mobile Object-Oriented Software“. The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1406064286.
Der volle Inhalt der QuelleFarahbakhsh, Reza. „Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools“. Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012/document.
Der volle Inhalt der QuellePopular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Farahbakhsh, Reza. „Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools“. Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012.
Der volle Inhalt der QuellePopular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Casserly, Alison P. „Integrated Analysis of miRNA/mRNA Expression in the Neurocircuitry Underlying Nicotine Dependence“. eScholarship@UMMS, 2018. https://escholarship.umassmed.edu/gsbs_diss/985.
Der volle Inhalt der QuelleKumar, Tushar. „Characterizing and controlling program behavior using execution-time variance“. Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/55000.
Der volle Inhalt der QuelleGao, Wei. „CONSTRUCTING USER BEHAVIORAL PROFILES USING DATA-MINING-BASED APPROACH“. Diss., Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1261%5F1%5Fm.pdf&type=application/pdf.
Der volle Inhalt der QuelleToure, Almamy. „Collection, analysis and harnessing of communication flows for cyber-attack detection“. Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Der volle Inhalt der QuelleThe increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Wu, Burton. „New variational Bayesian approaches for statistical data mining : with applications to profiling and differentiating habitual consumption behaviour of customers in the wireless telecommunication industry“. Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/46084/1/Burton_Wu_Thesis.pdf.
Der volle Inhalt der QuelleBücher zum Thema "Profiling and Behavioral Analysis"
Turvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 3. Aufl. Burlington, MA: Academic Press, 2008.
Den vollen Inhalt der Quelle findenTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 3. Aufl. Burlington, MA: Academic Press, 2008.
Den vollen Inhalt der Quelle findenTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 3. Aufl. Burlington, MA: Academic Press, 2008.
Den vollen Inhalt der Quelle findenTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 2. Aufl. London: Academic Press, 2001.
Den vollen Inhalt der Quelle findenAinswoth, Peter B. Offender profiling and crime analysis. Cullompton: Willan Pub., 2001.
Den vollen Inhalt der Quelle findenDonna, Youngs, Hrsg. Investigative psychology: Offender profiling and the analysis of criminal action. Chichester: John Wiley & Sons, 2009.
Den vollen Inhalt der Quelle findenNapier, Mike R. Behavior, truth and deception: applying profiling and analysis to the interview process. Boca Raton, FL: CRC Press, 2010.
Den vollen Inhalt der Quelle findenBartol, Curt R. Criminal and behavioral profiling. Thousand Oaks, Calif: SAGE Publications, 2013.
Den vollen Inhalt der Quelle findenGroff, Elizabeth (Elizabeth R.) und Yang Sue-Ming, Hrsg. The criminology of place: Street segments and our understanding of the crime problem. New York: Oxford University Press, 2012.
Den vollen Inhalt der Quelle findenFederspiel, Florian M., Gilberto Montibeller und Matthias Seifert, Hrsg. Behavioral Decision Analysis. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-44424-1.
Der volle Inhalt der QuelleBuchteile zum Thema "Profiling and Behavioral Analysis"
Hlioui, Fedia, Nadia Aloui und Faiez Gargouri. „Automatic Deduction of Learners’ Profiling Rules Based on Behavioral Analysis“. In Computational Collective Intelligence, 233–43. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67074-4_23.
Der volle Inhalt der QuelleAcien, Alejandro, Aythami Morales, Ruben Vera-Rodriguez und Julian Fierrez. „Keystroke Mobile Authentication: Performance of Long-Term Approaches and Fusion with Behavioral Profiling“. In Pattern Recognition and Image Analysis, 12–24. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31321-0_2.
Der volle Inhalt der QuelleShosha, Ahmed F., Joshua I. James, Alan Hannaway, Chen-Ching Liu und Pavel Gladyshev. „Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes“. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 66–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39891-9_5.
Der volle Inhalt der QuelleFan, Xiao-Xi, Kam-Pui Chow und Fei Xu. „Web User Profiling Based on Browsing Behavior Analysis“. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 57–71. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-662-44952-3_5.
Der volle Inhalt der QuelleNordahl, Christian, Veselka Boeva, Håkan Grahn und Marie Persson Netz. „Profiling of Household Residents’ Electricity Consumption Behavior Using Clustering Analysis“. In Lecture Notes in Computer Science, 779–86. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22750-0_78.
Der volle Inhalt der QuelleColombini, Clara Maria, Antonio Colella, Marco Mattiucci und Aniello Castiglione. „Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel“. In Lecture Notes in Computer Science, 416–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32498-7_31.
Der volle Inhalt der QuellePatterson, Wayne, und Cynthia E. Winston-Proctor. „Profiling“. In Behavioral Cybersecurity, 35–44. First edition. | Boca Raton : CRC Press, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003052029-5.
Der volle Inhalt der QuellePatterson, Wayne, und Cynthia E. Winston-Proctor. „Profiling“. In Behavioral Cybersecurity, 43–50. Boca Raton : Taylor & Francis, CRC Press, 2019.: CRC Press, 2019. http://dx.doi.org/10.1201/9780429461484-5.
Der volle Inhalt der QuelleBarkhashree und Parneeta Dhaliwal. „Reinforcing Digital Forensics Through Intelligent Behavioural Evidence Analysis: Social Media Hate Speech Profiling“. In Artificial Intelligence and Speech Technology, 641–50. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95711-7_52.
Der volle Inhalt der QuelleKhera, Varin, Anand R. Prasad und Suksit Kwanoran. „Online Tracking and Behavioral Profiling“. In Open Source Intelligence (OSINT) – A practical Introduction, 23–31. New York: River Publishers, 2024. http://dx.doi.org/10.1201/9788770047180-3.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Profiling and Behavioral Analysis"
Drachen, Anders, James Green, Chester Gray, Elie Harik, Patty Lu, Rafet Sifa und Diego Klabjan. „Guns and guardians: Comparative cluster analysis and behavioral profiling in destiny“. In 2016 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 2016. http://dx.doi.org/10.1109/cig.2016.7860423.
Der volle Inhalt der QuelleSingh, Malvika, B. M. Mehtre und S. Sangeetha. „User Behavior Profiling using Ensemble Approach for Insider Threat Detection“. In 2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA). IEEE, 2019. http://dx.doi.org/10.1109/isba.2019.8778466.
Der volle Inhalt der QuelleChen, Cheng-Yu, und Shun-Wen Hsiao. „IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis“. In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9005981.
Der volle Inhalt der QuelleXu, Kuai, Feng Wang und Bin Wang. „Behavior Profiling and Analysis in Wireless Home Networks“. In 2010 7th IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2010. http://dx.doi.org/10.1109/ccnc.2010.5421571.
Der volle Inhalt der QuelleShen, Xipeng, Michael L. Scott, Chengliang Zhang, Sandhya Dwarkadas, Chen Ding und Mitsunori Ogihara. „Analysis of input-dependent program behavior using active profiling“. In the 2007 workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1281700.1281705.
Der volle Inhalt der QuelleBerube, Paul, und Jose Nelson Amaral. „Combined profiling: A methodology to capture varied program behavior across multiple inputs“. In 2012 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS). IEEE, 2012. http://dx.doi.org/10.1109/ispass.2012.6189227.
Der volle Inhalt der QuelleGopal, Akshay C., und Lija Jacob. „Customer Behavior Analysis Using Unsupervised Clustering and Profiling: A Machine Learning Approach“. In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2022. http://dx.doi.org/10.1109/icacite53722.2022.9823646.
Der volle Inhalt der QuelleNeal, Tempestt, und Damon Woodard. „Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection“. In 2019 International Conference on Biometrics (ICB). IEEE, 2019. http://dx.doi.org/10.1109/icb45273.2019.8987407.
Der volle Inhalt der QuelleMao, Yilin, Caroline Godefroy und Michel Gysen. „Field Applications of Quantitative Fracture Diagnostic From Distributed Temperature Warmback Analysis“. In SPE Hydraulic Fracturing Technology Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/212380-ms.
Der volle Inhalt der QuelleAdil, Mohamed, Lingies Santhirasekaran, Nabilla Arief Tham und Brian Seabrook. „Injection Profiling for Intelligently Completed Wells Equipped with Fiber Optics“. In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211402-ms.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Profiling and Behavioral Analysis"
Del Valle, Emiliano Diaz, Chaning Jang und Steve Wendel. Behavioral Systems: Combining behavioral science and systems analysis. Busara, Januar 2024. http://dx.doi.org/10.62372/fmjl3064.
Der volle Inhalt der QuelleStevenson, Mark. Individual Profiling Using Text Analysis. Fort Belvoir, VA: Defense Technical Information Center, April 2016. http://dx.doi.org/10.21236/ad1009417.
Der volle Inhalt der QuelleKolencik, Marian. A critical evaluation of the risk indicators of criminal conduct involving CBRN and explosive materials - Behavioural and observational analysis in crime detection and investigation. ISEM Institute, n.p.o., Oktober 2023. http://dx.doi.org/10.52824/vzrb5079.
Der volle Inhalt der QuelleMarinucci, Antonio. ACIP Pile Installation, Installation Monitoring, Full-scale Load Testing, and Extraction Program. Deep Foundations Institute, Dezember 2017. http://dx.doi.org/10.37308/cpf-2016-acip-1.
Der volle Inhalt der QuelleBrauer, Douglas C., Daniel Henry und George A. Matzkanin. ACE/AACE Inspection and Analysis Handbook. Part 3. Profiling. Fort Belvoir, VA: Defense Technical Information Center, Juni 1985. http://dx.doi.org/10.21236/ada210049.
Der volle Inhalt der QuelleAcemoglu, Daron, und Martin Kaae Jensen. Equilibrium Analysis in the Behavioral Neoclassical Growth Model. Cambridge, MA: National Bureau of Economic Research, Dezember 2018. http://dx.doi.org/10.3386/w25363.
Der volle Inhalt der QuellePetry, Nancy, und Warren Bickel. A Behavioral Economic Analysis of Polydrug Abuse in Heroin Addicts. Cambridge, MA: National Bureau of Economic Research, Februar 1998. http://dx.doi.org/10.3386/w6415.
Der volle Inhalt der QuelleSilverman, Kenneth, und Elias Robles. Employment as a Drug Abuse Treatment Intervention: A Behavioral Economic Analysis. Cambridge, MA: National Bureau of Economic Research, Februar 1998. http://dx.doi.org/10.3386/w6402.
Der volle Inhalt der QuelleCoker, Ray. Toward a behavioral analysis of attentiveness as a style of communication. Portland State University Library, Januar 2000. http://dx.doi.org/10.15760/etd.3227.
Der volle Inhalt der QuelleBernheim, B. Douglas, und Antonio Rangel. Behavioral Public Economics: Welfare and Policy Analysis with Non-Standard Decision-Makers. Cambridge, MA: National Bureau of Economic Research, August 2005. http://dx.doi.org/10.3386/w11518.
Der volle Inhalt der Quelle