Littérature scientifique sur le sujet « Profiling and Behavioral Analysis »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Profiling and Behavioral Analysis ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Profiling and Behavioral Analysis"
FINTZY, ROBERT T. « Criminal Profiling : An Introduction to Behavioral Evidence Analysis ». American Journal of Psychiatry 157, no 9 (septembre 2000) : 1532–34. http://dx.doi.org/10.1176/appi.ajp.157.9.1532.
Texte intégralMartineau, Melissa, Elena Spiridon et Mary Aiken. « A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature ». Forensic Sciences 3, no 3 (22 juillet 2023) : 452–77. http://dx.doi.org/10.3390/forensicsci3030032.
Texte intégralYu, Szde. « BEHAVIORAL EVIDENCE ANALYSIS ON FACEBOOK : A TEST OF CYBER-PROFILING ». Defendologija 16, no 33 (10 mai 2013) : 19–30. http://dx.doi.org/10.5570/dfnd.en.1333.02.
Texte intégralLi, Hai, Luke Lunhua Mao, James Jianhui Zhang et Jiaxi Xu. « Classifying and Profiling Sports Lottery Gamblers : A Cluster Analysis Approach ». Social Behavior and Personality : an international journal 43, no 8 (18 septembre 2015) : 1299–317. http://dx.doi.org/10.2224/sbp.2015.43.8.1299.
Texte intégralHarini, Karthick, Suliman Yousef Alomar, Mohammed Vajagathali, Salim Manoharadas, Anbazhagan Thirumalai, Koyeli Girigoswami et Agnishwar Girigoswami. « Niosomal Bupropion : Exploring Therapeutic Frontiers through Behavioral Profiling ». Pharmaceuticals 17, no 3 (12 mars 2024) : 366. http://dx.doi.org/10.3390/ph17030366.
Texte intégralSABUNCU, Ä°brahim, Edanur TÃœRKAN et Hilal POLAT. « CUSTOMER SEGMENTATION AND PROFILING WITH RFM ANALYSIS ». TURKISH JOURNAL OF MARKETING 5, no 1 (25 avril 2020) : 22–36. http://dx.doi.org/10.30685/tujom.v5i1.84.
Texte intégralvon Ziegler, Lukas, Oliver Sturman et Johannes Bohacek. « Big behavior : challenges and opportunities in a new era of deep behavior profiling ». Neuropsychopharmacology 46, no 1 (29 juin 2020) : 33–44. http://dx.doi.org/10.1038/s41386-020-0751-7.
Texte intégralAdeyiga, J. A., S. O. Olabiyisi et E. O. Omidiora. « A comparative analysis of selected clustering algorithms for criminal profiling ». Nigerian Journal of Technology 39, no 2 (16 juillet 2020) : 464–71. http://dx.doi.org/10.4314/njt.v39i2.16.
Texte intégralCantore, Daniele. « On Biometrics and Profiling ». International Journal of Technoethics 2, no 4 (octobre 2011) : 84–93. http://dx.doi.org/10.4018/jte.2011100106.
Texte intégralTrusov, Michael, Liye Ma et Zainab Jamal. « Crumbs of the Cookie : User Profiling in Customer-Base Analysis and Behavioral Targeting ». Marketing Science 35, no 3 (mai 2016) : 405–26. http://dx.doi.org/10.1287/mksc.2015.0956.
Texte intégralThèses sur le sujet "Profiling and Behavioral Analysis"
Lane, Erin C. « Urban disadvantage, social disorganization, and racial profiling an analysis of ecology and police officers' race-specific search behaviors / ». [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012660.
Texte intégralSchmidt, Elisabeth. « Profiling the german Gazela vinho verde consumer : a market segmentation based on product quality ». Master's thesis, [s.n.], 2013. http://hdl.handle.net/10284/4105.
Texte intégralThe core objective of this study was to find out what preferences and wine consumer patterns characterize specific segments in the German market for Vinho Verde. For this purpose an exploratory research using a self-administered questionnaire was applied. The basis for a cluster analysis was a measurement scale about the perceived product quality of Gazela. Four segments were derived from the cluster analysis: (1) refusing, (2) enthusiastic, (3) indifferent and (4) enjoying Vinho Verde drinker. The second and the fourth segments were found to be the main target groups for Gazela. The findings about the associations between Portugal as the country of origin of Gazela and Portuguese wine were rather negative. The managerial implications suggest developing an advertising campaign in order to successfully promote Gazela in Germany. Two alternatives are suggested: keeping the country of origin on the label or removing it. The first suggestion requires extensive measures and actions to improve the image of wine, which is “made in Portugal”. The results of this study show the need of increasing the awareness of Vinho Verde among German consumers and indicate the need of improvement of the perceptions about Portugal and Portuguese wine and examine possibilities for enhancing the acceptance of Portuguese wine, especially Vinho Verde in Germany.
O objetivo principal deste estudo foi o de descobrir as preferências e os padrões de consumo de vinho que caracterizam os segmentos específicos do mercado alemão para o Vinho Verde. Para este objectivo esta pesquisa exploratória utilizou um questionário auto-administrado. A escala base escolhida para a análise de cluster foi a de medição sobre a qualidade do produto percebida aplicada à marca Gazela. Foram obtidos quatros segmentos a partir da análise de cluster: (1) Objector (2), entusiasta, (3) indiferente e (4) Fruidor de Vinho Verde. Os segmentos 2 e 4 são os grupos alvos de Gazela. Os resultados sobre as associações com Portugal, o país de origem do Gazela, e vinho português demostraram relações bastante negativas. As implicações ao nível da gestão sugerem o desenvolvimento de uma campanha publicitária para promover o sucesso de Gazela na alemanha. Duas alternativas são sugeridas: manter o país de origem no rótulo ou removê-lo. A primeira sugestão requer medidas e ações mais abrangentes para melhorar a imagem do vinho "made in Portugal". Os resultados deste estudo apontam para a necessidade de aumentar a consciência sobre o Vinho Verde entre os consumidores alemães e indicam a necessidade de melhoria das percepções sobre Portugal e sobre o vinho português e de estudar as possibilidades de aumentar a aceitação de vinho português, especialmente o Vinho Verde na Alemanha.
Yan, Dacong. « Program Analyses for Understanding the Behavior and Performance of Traditional and Mobile Object-Oriented Software ». The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1406064286.
Texte intégralFarahbakhsh, Reza. « Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools ». Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012/document.
Texte intégralPopular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Farahbakhsh, Reza. « Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools ». Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012.
Texte intégralPopular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Casserly, Alison P. « Integrated Analysis of miRNA/mRNA Expression in the Neurocircuitry Underlying Nicotine Dependence ». eScholarship@UMMS, 2018. https://escholarship.umassmed.edu/gsbs_diss/985.
Texte intégralKumar, Tushar. « Characterizing and controlling program behavior using execution-time variance ». Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/55000.
Texte intégralGao, Wei. « CONSTRUCTING USER BEHAVIORAL PROFILES USING DATA-MINING-BASED APPROACH ». Diss., Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1261%5F1%5Fm.pdf&type=application/pdf.
Texte intégralToure, Almamy. « Collection, analysis and harnessing of communication flows for cyber-attack detection ». Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Texte intégralThe increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Wu, Burton. « New variational Bayesian approaches for statistical data mining : with applications to profiling and differentiating habitual consumption behaviour of customers in the wireless telecommunication industry ». Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/46084/1/Burton_Wu_Thesis.pdf.
Texte intégralLivres sur le sujet "Profiling and Behavioral Analysis"
Turvey, Brent E. Criminal profiling : An introduction to behavioral evidence analysis. 3e éd. Burlington, MA : Academic Press, 2008.
Trouver le texte intégralTurvey, Brent E. Criminal profiling : An introduction to behavioral evidence analysis. 3e éd. Burlington, MA : Academic Press, 2008.
Trouver le texte intégralTurvey, Brent E. Criminal profiling : An introduction to behavioral evidence analysis. 3e éd. Burlington, MA : Academic Press, 2008.
Trouver le texte intégralTurvey, Brent E. Criminal profiling : An introduction to behavioral evidence analysis. 2e éd. London : Academic Press, 2001.
Trouver le texte intégralAinswoth, Peter B. Offender profiling and crime analysis. Cullompton : Willan Pub., 2001.
Trouver le texte intégralDonna, Youngs, dir. Investigative psychology : Offender profiling and the analysis of criminal action. Chichester : John Wiley & Sons, 2009.
Trouver le texte intégralNapier, Mike R. Behavior, truth and deception : applying profiling and analysis to the interview process. Boca Raton, FL : CRC Press, 2010.
Trouver le texte intégralBartol, Curt R. Criminal and behavioral profiling. Thousand Oaks, Calif : SAGE Publications, 2013.
Trouver le texte intégralGroff, Elizabeth (Elizabeth R.) et Yang Sue-Ming, dir. The criminology of place : Street segments and our understanding of the crime problem. New York : Oxford University Press, 2012.
Trouver le texte intégralFederspiel, Florian M., Gilberto Montibeller et Matthias Seifert, dir. Behavioral Decision Analysis. Cham : Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-44424-1.
Texte intégralChapitres de livres sur le sujet "Profiling and Behavioral Analysis"
Hlioui, Fedia, Nadia Aloui et Faiez Gargouri. « Automatic Deduction of Learners’ Profiling Rules Based on Behavioral Analysis ». Dans Computational Collective Intelligence, 233–43. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67074-4_23.
Texte intégralAcien, Alejandro, Aythami Morales, Ruben Vera-Rodriguez et Julian Fierrez. « Keystroke Mobile Authentication : Performance of Long-Term Approaches and Fusion with Behavioral Profiling ». Dans Pattern Recognition and Image Analysis, 12–24. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31321-0_2.
Texte intégralShosha, Ahmed F., Joshua I. James, Alan Hannaway, Chen-Ching Liu et Pavel Gladyshev. « Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes ». Dans Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 66–80. Berlin, Heidelberg : Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39891-9_5.
Texte intégralFan, Xiao-Xi, Kam-Pui Chow et Fei Xu. « Web User Profiling Based on Browsing Behavior Analysis ». Dans Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 57–71. Cham : Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-662-44952-3_5.
Texte intégralNordahl, Christian, Veselka Boeva, Håkan Grahn et Marie Persson Netz. « Profiling of Household Residents’ Electricity Consumption Behavior Using Clustering Analysis ». Dans Lecture Notes in Computer Science, 779–86. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22750-0_78.
Texte intégralColombini, Clara Maria, Antonio Colella, Marco Mattiucci et Aniello Castiglione. « Network Profiling : Content Analysis of Users Behavior in Digital Communication Channel ». Dans Lecture Notes in Computer Science, 416–29. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32498-7_31.
Texte intégralPatterson, Wayne, et Cynthia E. Winston-Proctor. « Profiling ». Dans Behavioral Cybersecurity, 35–44. First edition. | Boca Raton : CRC Press, 2021. : CRC Press, 2020. http://dx.doi.org/10.1201/9781003052029-5.
Texte intégralPatterson, Wayne, et Cynthia E. Winston-Proctor. « Profiling ». Dans Behavioral Cybersecurity, 43–50. Boca Raton : Taylor & Francis, CRC Press, 2019. : CRC Press, 2019. http://dx.doi.org/10.1201/9780429461484-5.
Texte intégralBarkhashree et Parneeta Dhaliwal. « Reinforcing Digital Forensics Through Intelligent Behavioural Evidence Analysis : Social Media Hate Speech Profiling ». Dans Artificial Intelligence and Speech Technology, 641–50. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95711-7_52.
Texte intégralKhera, Varin, Anand R. Prasad et Suksit Kwanoran. « Online Tracking and Behavioral Profiling ». Dans Open Source Intelligence (OSINT) – A practical Introduction, 23–31. New York : River Publishers, 2024. http://dx.doi.org/10.1201/9788770047180-3.
Texte intégralActes de conférences sur le sujet "Profiling and Behavioral Analysis"
Drachen, Anders, James Green, Chester Gray, Elie Harik, Patty Lu, Rafet Sifa et Diego Klabjan. « Guns and guardians : Comparative cluster analysis and behavioral profiling in destiny ». Dans 2016 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 2016. http://dx.doi.org/10.1109/cig.2016.7860423.
Texte intégralSingh, Malvika, B. M. Mehtre et S. Sangeetha. « User Behavior Profiling using Ensemble Approach for Insider Threat Detection ». Dans 2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA). IEEE, 2019. http://dx.doi.org/10.1109/isba.2019.8778466.
Texte intégralChen, Cheng-Yu, et Shun-Wen Hsiao. « IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis ». Dans 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9005981.
Texte intégralXu, Kuai, Feng Wang et Bin Wang. « Behavior Profiling and Analysis in Wireless Home Networks ». Dans 2010 7th IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2010. http://dx.doi.org/10.1109/ccnc.2010.5421571.
Texte intégralShen, Xipeng, Michael L. Scott, Chengliang Zhang, Sandhya Dwarkadas, Chen Ding et Mitsunori Ogihara. « Analysis of input-dependent program behavior using active profiling ». Dans the 2007 workshop. New York, New York, USA : ACM Press, 2007. http://dx.doi.org/10.1145/1281700.1281705.
Texte intégralBerube, Paul, et Jose Nelson Amaral. « Combined profiling : A methodology to capture varied program behavior across multiple inputs ». Dans 2012 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS). IEEE, 2012. http://dx.doi.org/10.1109/ispass.2012.6189227.
Texte intégralGopal, Akshay C., et Lija Jacob. « Customer Behavior Analysis Using Unsupervised Clustering and Profiling : A Machine Learning Approach ». Dans 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2022. http://dx.doi.org/10.1109/icacite53722.2022.9823646.
Texte intégralNeal, Tempestt, et Damon Woodard. « Mobile Biometrics, Replay Attacks, and Behavior Profiling : An Empirical Analysis of Impostor Detection ». Dans 2019 International Conference on Biometrics (ICB). IEEE, 2019. http://dx.doi.org/10.1109/icb45273.2019.8987407.
Texte intégralMao, Yilin, Caroline Godefroy et Michel Gysen. « Field Applications of Quantitative Fracture Diagnostic From Distributed Temperature Warmback Analysis ». Dans SPE Hydraulic Fracturing Technology Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/212380-ms.
Texte intégralAdil, Mohamed, Lingies Santhirasekaran, Nabilla Arief Tham et Brian Seabrook. « Injection Profiling for Intelligently Completed Wells Equipped with Fiber Optics ». Dans ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211402-ms.
Texte intégralRapports d'organisations sur le sujet "Profiling and Behavioral Analysis"
Del Valle, Emiliano Diaz, Chaning Jang et Steve Wendel. Behavioral Systems : Combining behavioral science and systems analysis. Busara, janvier 2024. http://dx.doi.org/10.62372/fmjl3064.
Texte intégralStevenson, Mark. Individual Profiling Using Text Analysis. Fort Belvoir, VA : Defense Technical Information Center, avril 2016. http://dx.doi.org/10.21236/ad1009417.
Texte intégralKolencik, Marian. A critical evaluation of the risk indicators of criminal conduct involving CBRN and explosive materials - Behavioural and observational analysis in crime detection and investigation. ISEM Institute, n.p.o., octobre 2023. http://dx.doi.org/10.52824/vzrb5079.
Texte intégralMarinucci, Antonio. ACIP Pile Installation, Installation Monitoring, Full-scale Load Testing, and Extraction Program. Deep Foundations Institute, décembre 2017. http://dx.doi.org/10.37308/cpf-2016-acip-1.
Texte intégralBrauer, Douglas C., Daniel Henry et George A. Matzkanin. ACE/AACE Inspection and Analysis Handbook. Part 3. Profiling. Fort Belvoir, VA : Defense Technical Information Center, juin 1985. http://dx.doi.org/10.21236/ada210049.
Texte intégralAcemoglu, Daron, et Martin Kaae Jensen. Equilibrium Analysis in the Behavioral Neoclassical Growth Model. Cambridge, MA : National Bureau of Economic Research, décembre 2018. http://dx.doi.org/10.3386/w25363.
Texte intégralPetry, Nancy, et Warren Bickel. A Behavioral Economic Analysis of Polydrug Abuse in Heroin Addicts. Cambridge, MA : National Bureau of Economic Research, février 1998. http://dx.doi.org/10.3386/w6415.
Texte intégralSilverman, Kenneth, et Elias Robles. Employment as a Drug Abuse Treatment Intervention : A Behavioral Economic Analysis. Cambridge, MA : National Bureau of Economic Research, février 1998. http://dx.doi.org/10.3386/w6402.
Texte intégralCoker, Ray. Toward a behavioral analysis of attentiveness as a style of communication. Portland State University Library, janvier 2000. http://dx.doi.org/10.15760/etd.3227.
Texte intégralBernheim, B. Douglas, et Antonio Rangel. Behavioral Public Economics : Welfare and Policy Analysis with Non-Standard Decision-Makers. Cambridge, MA : National Bureau of Economic Research, août 2005. http://dx.doi.org/10.3386/w11518.
Texte intégral