Gotowa bibliografia na temat „Profiling and Behavioral Analysis”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Profiling and Behavioral Analysis”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Profiling and Behavioral Analysis"
FINTZY, ROBERT T. "Criminal Profiling: An Introduction to Behavioral Evidence Analysis". American Journal of Psychiatry 157, nr 9 (wrzesień 2000): 1532–34. http://dx.doi.org/10.1176/appi.ajp.157.9.1532.
Pełny tekst źródłaMartineau, Melissa, Elena Spiridon i Mary Aiken. "A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature". Forensic Sciences 3, nr 3 (22.07.2023): 452–77. http://dx.doi.org/10.3390/forensicsci3030032.
Pełny tekst źródłaYu, Szde. "BEHAVIORAL EVIDENCE ANALYSIS ON FACEBOOK: A TEST OF CYBER-PROFILING". Defendologija 16, nr 33 (10.05.2013): 19–30. http://dx.doi.org/10.5570/dfnd.en.1333.02.
Pełny tekst źródłaLi, Hai, Luke Lunhua Mao, James Jianhui Zhang i Jiaxi Xu. "Classifying and Profiling Sports Lottery Gamblers: A Cluster Analysis Approach". Social Behavior and Personality: an international journal 43, nr 8 (18.09.2015): 1299–317. http://dx.doi.org/10.2224/sbp.2015.43.8.1299.
Pełny tekst źródłaHarini, Karthick, Suliman Yousef Alomar, Mohammed Vajagathali, Salim Manoharadas, Anbazhagan Thirumalai, Koyeli Girigoswami i Agnishwar Girigoswami. "Niosomal Bupropion: Exploring Therapeutic Frontiers through Behavioral Profiling". Pharmaceuticals 17, nr 3 (12.03.2024): 366. http://dx.doi.org/10.3390/ph17030366.
Pełny tekst źródłaSABUNCU, Ä°brahim, Edanur TÃœRKAN i Hilal POLAT. "CUSTOMER SEGMENTATION AND PROFILING WITH RFM ANALYSIS". TURKISH JOURNAL OF MARKETING 5, nr 1 (25.04.2020): 22–36. http://dx.doi.org/10.30685/tujom.v5i1.84.
Pełny tekst źródłavon Ziegler, Lukas, Oliver Sturman i Johannes Bohacek. "Big behavior: challenges and opportunities in a new era of deep behavior profiling". Neuropsychopharmacology 46, nr 1 (29.06.2020): 33–44. http://dx.doi.org/10.1038/s41386-020-0751-7.
Pełny tekst źródłaAdeyiga, J. A., S. O. Olabiyisi i E. O. Omidiora. "A comparative analysis of selected clustering algorithms for criminal profiling". Nigerian Journal of Technology 39, nr 2 (16.07.2020): 464–71. http://dx.doi.org/10.4314/njt.v39i2.16.
Pełny tekst źródłaCantore, Daniele. "On Biometrics and Profiling". International Journal of Technoethics 2, nr 4 (październik 2011): 84–93. http://dx.doi.org/10.4018/jte.2011100106.
Pełny tekst źródłaTrusov, Michael, Liye Ma i Zainab Jamal. "Crumbs of the Cookie: User Profiling in Customer-Base Analysis and Behavioral Targeting". Marketing Science 35, nr 3 (maj 2016): 405–26. http://dx.doi.org/10.1287/mksc.2015.0956.
Pełny tekst źródłaRozprawy doktorskie na temat "Profiling and Behavioral Analysis"
Lane, Erin C. "Urban disadvantage, social disorganization, and racial profiling an analysis of ecology and police officers' race-specific search behaviors /". [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012660.
Pełny tekst źródłaSchmidt, Elisabeth. "Profiling the german Gazela vinho verde consumer: a market segmentation based on product quality". Master's thesis, [s.n.], 2013. http://hdl.handle.net/10284/4105.
Pełny tekst źródłaThe core objective of this study was to find out what preferences and wine consumer patterns characterize specific segments in the German market for Vinho Verde. For this purpose an exploratory research using a self-administered questionnaire was applied. The basis for a cluster analysis was a measurement scale about the perceived product quality of Gazela. Four segments were derived from the cluster analysis: (1) refusing, (2) enthusiastic, (3) indifferent and (4) enjoying Vinho Verde drinker. The second and the fourth segments were found to be the main target groups for Gazela. The findings about the associations between Portugal as the country of origin of Gazela and Portuguese wine were rather negative. The managerial implications suggest developing an advertising campaign in order to successfully promote Gazela in Germany. Two alternatives are suggested: keeping the country of origin on the label or removing it. The first suggestion requires extensive measures and actions to improve the image of wine, which is “made in Portugal”. The results of this study show the need of increasing the awareness of Vinho Verde among German consumers and indicate the need of improvement of the perceptions about Portugal and Portuguese wine and examine possibilities for enhancing the acceptance of Portuguese wine, especially Vinho Verde in Germany.
O objetivo principal deste estudo foi o de descobrir as preferências e os padrões de consumo de vinho que caracterizam os segmentos específicos do mercado alemão para o Vinho Verde. Para este objectivo esta pesquisa exploratória utilizou um questionário auto-administrado. A escala base escolhida para a análise de cluster foi a de medição sobre a qualidade do produto percebida aplicada à marca Gazela. Foram obtidos quatros segmentos a partir da análise de cluster: (1) Objector (2), entusiasta, (3) indiferente e (4) Fruidor de Vinho Verde. Os segmentos 2 e 4 são os grupos alvos de Gazela. Os resultados sobre as associações com Portugal, o país de origem do Gazela, e vinho português demostraram relações bastante negativas. As implicações ao nível da gestão sugerem o desenvolvimento de uma campanha publicitária para promover o sucesso de Gazela na alemanha. Duas alternativas são sugeridas: manter o país de origem no rótulo ou removê-lo. A primeira sugestão requer medidas e ações mais abrangentes para melhorar a imagem do vinho "made in Portugal". Os resultados deste estudo apontam para a necessidade de aumentar a consciência sobre o Vinho Verde entre os consumidores alemães e indicam a necessidade de melhoria das percepções sobre Portugal e sobre o vinho português e de estudar as possibilidades de aumentar a aceitação de vinho português, especialmente o Vinho Verde na Alemanha.
Yan, Dacong. "Program Analyses for Understanding the Behavior and Performance of Traditional and Mobile Object-Oriented Software". The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1406064286.
Pełny tekst źródłaFarahbakhsh, Reza. "Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools". Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012/document.
Pełny tekst źródłaPopular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Farahbakhsh, Reza. "Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012.
Pełny tekst źródłaPopular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Casserly, Alison P. "Integrated Analysis of miRNA/mRNA Expression in the Neurocircuitry Underlying Nicotine Dependence". eScholarship@UMMS, 2018. https://escholarship.umassmed.edu/gsbs_diss/985.
Pełny tekst źródłaKumar, Tushar. "Characterizing and controlling program behavior using execution-time variance". Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/55000.
Pełny tekst źródłaGao, Wei. "CONSTRUCTING USER BEHAVIORAL PROFILES USING DATA-MINING-BASED APPROACH". Diss., Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1261%5F1%5Fm.pdf&type=application/pdf.
Pełny tekst źródłaToure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection". Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Pełny tekst źródłaThe increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Wu, Burton. "New variational Bayesian approaches for statistical data mining : with applications to profiling and differentiating habitual consumption behaviour of customers in the wireless telecommunication industry". Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/46084/1/Burton_Wu_Thesis.pdf.
Pełny tekst źródłaKsiążki na temat "Profiling and Behavioral Analysis"
Turvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. Wyd. 3. Burlington, MA: Academic Press, 2008.
Znajdź pełny tekst źródłaTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. Wyd. 3. Burlington, MA: Academic Press, 2008.
Znajdź pełny tekst źródłaTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. Wyd. 3. Burlington, MA: Academic Press, 2008.
Znajdź pełny tekst źródłaTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. Wyd. 2. London: Academic Press, 2001.
Znajdź pełny tekst źródłaAinswoth, Peter B. Offender profiling and crime analysis. Cullompton: Willan Pub., 2001.
Znajdź pełny tekst źródłaDonna, Youngs, red. Investigative psychology: Offender profiling and the analysis of criminal action. Chichester: John Wiley & Sons, 2009.
Znajdź pełny tekst źródłaNapier, Mike R. Behavior, truth and deception: applying profiling and analysis to the interview process. Boca Raton, FL: CRC Press, 2010.
Znajdź pełny tekst źródłaBartol, Curt R. Criminal and behavioral profiling. Thousand Oaks, Calif: SAGE Publications, 2013.
Znajdź pełny tekst źródłaGroff, Elizabeth (Elizabeth R.) i Yang Sue-Ming, red. The criminology of place: Street segments and our understanding of the crime problem. New York: Oxford University Press, 2012.
Znajdź pełny tekst źródłaFederspiel, Florian M., Gilberto Montibeller i Matthias Seifert, red. Behavioral Decision Analysis. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-44424-1.
Pełny tekst źródłaCzęści książek na temat "Profiling and Behavioral Analysis"
Hlioui, Fedia, Nadia Aloui i Faiez Gargouri. "Automatic Deduction of Learners’ Profiling Rules Based on Behavioral Analysis". W Computational Collective Intelligence, 233–43. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67074-4_23.
Pełny tekst źródłaAcien, Alejandro, Aythami Morales, Ruben Vera-Rodriguez i Julian Fierrez. "Keystroke Mobile Authentication: Performance of Long-Term Approaches and Fusion with Behavioral Profiling". W Pattern Recognition and Image Analysis, 12–24. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31321-0_2.
Pełny tekst źródłaShosha, Ahmed F., Joshua I. James, Alan Hannaway, Chen-Ching Liu i Pavel Gladyshev. "Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes". W Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 66–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39891-9_5.
Pełny tekst źródłaFan, Xiao-Xi, Kam-Pui Chow i Fei Xu. "Web User Profiling Based on Browsing Behavior Analysis". W Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 57–71. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-662-44952-3_5.
Pełny tekst źródłaNordahl, Christian, Veselka Boeva, Håkan Grahn i Marie Persson Netz. "Profiling of Household Residents’ Electricity Consumption Behavior Using Clustering Analysis". W Lecture Notes in Computer Science, 779–86. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22750-0_78.
Pełny tekst źródłaColombini, Clara Maria, Antonio Colella, Marco Mattiucci i Aniello Castiglione. "Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel". W Lecture Notes in Computer Science, 416–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32498-7_31.
Pełny tekst źródłaPatterson, Wayne, i Cynthia E. Winston-Proctor. "Profiling". W Behavioral Cybersecurity, 35–44. First edition. | Boca Raton : CRC Press, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003052029-5.
Pełny tekst źródłaPatterson, Wayne, i Cynthia E. Winston-Proctor. "Profiling". W Behavioral Cybersecurity, 43–50. Boca Raton : Taylor & Francis, CRC Press, 2019.: CRC Press, 2019. http://dx.doi.org/10.1201/9780429461484-5.
Pełny tekst źródłaBarkhashree i Parneeta Dhaliwal. "Reinforcing Digital Forensics Through Intelligent Behavioural Evidence Analysis: Social Media Hate Speech Profiling". W Artificial Intelligence and Speech Technology, 641–50. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95711-7_52.
Pełny tekst źródłaKhera, Varin, Anand R. Prasad i Suksit Kwanoran. "Online Tracking and Behavioral Profiling". W Open Source Intelligence (OSINT) – A practical Introduction, 23–31. New York: River Publishers, 2024. http://dx.doi.org/10.1201/9788770047180-3.
Pełny tekst źródłaStreszczenia konferencji na temat "Profiling and Behavioral Analysis"
Drachen, Anders, James Green, Chester Gray, Elie Harik, Patty Lu, Rafet Sifa i Diego Klabjan. "Guns and guardians: Comparative cluster analysis and behavioral profiling in destiny". W 2016 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 2016. http://dx.doi.org/10.1109/cig.2016.7860423.
Pełny tekst źródłaSingh, Malvika, B. M. Mehtre i S. Sangeetha. "User Behavior Profiling using Ensemble Approach for Insider Threat Detection". W 2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA). IEEE, 2019. http://dx.doi.org/10.1109/isba.2019.8778466.
Pełny tekst źródłaChen, Cheng-Yu, i Shun-Wen Hsiao. "IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis". W 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9005981.
Pełny tekst źródłaXu, Kuai, Feng Wang i Bin Wang. "Behavior Profiling and Analysis in Wireless Home Networks". W 2010 7th IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2010. http://dx.doi.org/10.1109/ccnc.2010.5421571.
Pełny tekst źródłaShen, Xipeng, Michael L. Scott, Chengliang Zhang, Sandhya Dwarkadas, Chen Ding i Mitsunori Ogihara. "Analysis of input-dependent program behavior using active profiling". W the 2007 workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1281700.1281705.
Pełny tekst źródłaBerube, Paul, i Jose Nelson Amaral. "Combined profiling: A methodology to capture varied program behavior across multiple inputs". W 2012 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS). IEEE, 2012. http://dx.doi.org/10.1109/ispass.2012.6189227.
Pełny tekst źródłaGopal, Akshay C., i Lija Jacob. "Customer Behavior Analysis Using Unsupervised Clustering and Profiling: A Machine Learning Approach". W 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2022. http://dx.doi.org/10.1109/icacite53722.2022.9823646.
Pełny tekst źródłaNeal, Tempestt, i Damon Woodard. "Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection". W 2019 International Conference on Biometrics (ICB). IEEE, 2019. http://dx.doi.org/10.1109/icb45273.2019.8987407.
Pełny tekst źródłaMao, Yilin, Caroline Godefroy i Michel Gysen. "Field Applications of Quantitative Fracture Diagnostic From Distributed Temperature Warmback Analysis". W SPE Hydraulic Fracturing Technology Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/212380-ms.
Pełny tekst źródłaAdil, Mohamed, Lingies Santhirasekaran, Nabilla Arief Tham i Brian Seabrook. "Injection Profiling for Intelligently Completed Wells Equipped with Fiber Optics". W ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211402-ms.
Pełny tekst źródłaRaporty organizacyjne na temat "Profiling and Behavioral Analysis"
Del Valle, Emiliano Diaz, Chaning Jang i Steve Wendel. Behavioral Systems: Combining behavioral science and systems analysis. Busara, styczeń 2024. http://dx.doi.org/10.62372/fmjl3064.
Pełny tekst źródłaStevenson, Mark. Individual Profiling Using Text Analysis. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2016. http://dx.doi.org/10.21236/ad1009417.
Pełny tekst źródłaKolencik, Marian. A critical evaluation of the risk indicators of criminal conduct involving CBRN and explosive materials - Behavioural and observational analysis in crime detection and investigation. ISEM Institute, n.p.o., październik 2023. http://dx.doi.org/10.52824/vzrb5079.
Pełny tekst źródłaMarinucci, Antonio. ACIP Pile Installation, Installation Monitoring, Full-scale Load Testing, and Extraction Program. Deep Foundations Institute, grudzień 2017. http://dx.doi.org/10.37308/cpf-2016-acip-1.
Pełny tekst źródłaBrauer, Douglas C., Daniel Henry i George A. Matzkanin. ACE/AACE Inspection and Analysis Handbook. Part 3. Profiling. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 1985. http://dx.doi.org/10.21236/ada210049.
Pełny tekst źródłaAcemoglu, Daron, i Martin Kaae Jensen. Equilibrium Analysis in the Behavioral Neoclassical Growth Model. Cambridge, MA: National Bureau of Economic Research, grudzień 2018. http://dx.doi.org/10.3386/w25363.
Pełny tekst źródłaPetry, Nancy, i Warren Bickel. A Behavioral Economic Analysis of Polydrug Abuse in Heroin Addicts. Cambridge, MA: National Bureau of Economic Research, luty 1998. http://dx.doi.org/10.3386/w6415.
Pełny tekst źródłaSilverman, Kenneth, i Elias Robles. Employment as a Drug Abuse Treatment Intervention: A Behavioral Economic Analysis. Cambridge, MA: National Bureau of Economic Research, luty 1998. http://dx.doi.org/10.3386/w6402.
Pełny tekst źródłaCoker, Ray. Toward a behavioral analysis of attentiveness as a style of communication. Portland State University Library, styczeń 2000. http://dx.doi.org/10.15760/etd.3227.
Pełny tekst źródłaBernheim, B. Douglas, i Antonio Rangel. Behavioral Public Economics: Welfare and Policy Analysis with Non-Standard Decision-Makers. Cambridge, MA: National Bureau of Economic Research, sierpień 2005. http://dx.doi.org/10.3386/w11518.
Pełny tekst źródła