Literatura científica selecionada sobre o tema "Profiling and Behavioral Analysis"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Profiling and Behavioral Analysis".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Profiling and Behavioral Analysis"
FINTZY, ROBERT T. "Criminal Profiling: An Introduction to Behavioral Evidence Analysis". American Journal of Psychiatry 157, n.º 9 (setembro de 2000): 1532–34. http://dx.doi.org/10.1176/appi.ajp.157.9.1532.
Texto completo da fonteMartineau, Melissa, Elena Spiridon e Mary Aiken. "A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature". Forensic Sciences 3, n.º 3 (22 de julho de 2023): 452–77. http://dx.doi.org/10.3390/forensicsci3030032.
Texto completo da fonteYu, Szde. "BEHAVIORAL EVIDENCE ANALYSIS ON FACEBOOK: A TEST OF CYBER-PROFILING". Defendologija 16, n.º 33 (10 de maio de 2013): 19–30. http://dx.doi.org/10.5570/dfnd.en.1333.02.
Texto completo da fonteLi, Hai, Luke Lunhua Mao, James Jianhui Zhang e Jiaxi Xu. "Classifying and Profiling Sports Lottery Gamblers: A Cluster Analysis Approach". Social Behavior and Personality: an international journal 43, n.º 8 (18 de setembro de 2015): 1299–317. http://dx.doi.org/10.2224/sbp.2015.43.8.1299.
Texto completo da fonteHarini, Karthick, Suliman Yousef Alomar, Mohammed Vajagathali, Salim Manoharadas, Anbazhagan Thirumalai, Koyeli Girigoswami e Agnishwar Girigoswami. "Niosomal Bupropion: Exploring Therapeutic Frontiers through Behavioral Profiling". Pharmaceuticals 17, n.º 3 (12 de março de 2024): 366. http://dx.doi.org/10.3390/ph17030366.
Texto completo da fonteSABUNCU, Ä°brahim, Edanur TÃœRKAN e Hilal POLAT. "CUSTOMER SEGMENTATION AND PROFILING WITH RFM ANALYSIS". TURKISH JOURNAL OF MARKETING 5, n.º 1 (25 de abril de 2020): 22–36. http://dx.doi.org/10.30685/tujom.v5i1.84.
Texto completo da fontevon Ziegler, Lukas, Oliver Sturman e Johannes Bohacek. "Big behavior: challenges and opportunities in a new era of deep behavior profiling". Neuropsychopharmacology 46, n.º 1 (29 de junho de 2020): 33–44. http://dx.doi.org/10.1038/s41386-020-0751-7.
Texto completo da fonteAdeyiga, J. A., S. O. Olabiyisi e E. O. Omidiora. "A comparative analysis of selected clustering algorithms for criminal profiling". Nigerian Journal of Technology 39, n.º 2 (16 de julho de 2020): 464–71. http://dx.doi.org/10.4314/njt.v39i2.16.
Texto completo da fonteCantore, Daniele. "On Biometrics and Profiling". International Journal of Technoethics 2, n.º 4 (outubro de 2011): 84–93. http://dx.doi.org/10.4018/jte.2011100106.
Texto completo da fonteTrusov, Michael, Liye Ma e Zainab Jamal. "Crumbs of the Cookie: User Profiling in Customer-Base Analysis and Behavioral Targeting". Marketing Science 35, n.º 3 (maio de 2016): 405–26. http://dx.doi.org/10.1287/mksc.2015.0956.
Texto completo da fonteTeses / dissertações sobre o assunto "Profiling and Behavioral Analysis"
Lane, Erin C. "Urban disadvantage, social disorganization, and racial profiling an analysis of ecology and police officers' race-specific search behaviors /". [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012660.
Texto completo da fonteSchmidt, Elisabeth. "Profiling the german Gazela vinho verde consumer: a market segmentation based on product quality". Master's thesis, [s.n.], 2013. http://hdl.handle.net/10284/4105.
Texto completo da fonteThe core objective of this study was to find out what preferences and wine consumer patterns characterize specific segments in the German market for Vinho Verde. For this purpose an exploratory research using a self-administered questionnaire was applied. The basis for a cluster analysis was a measurement scale about the perceived product quality of Gazela. Four segments were derived from the cluster analysis: (1) refusing, (2) enthusiastic, (3) indifferent and (4) enjoying Vinho Verde drinker. The second and the fourth segments were found to be the main target groups for Gazela. The findings about the associations between Portugal as the country of origin of Gazela and Portuguese wine were rather negative. The managerial implications suggest developing an advertising campaign in order to successfully promote Gazela in Germany. Two alternatives are suggested: keeping the country of origin on the label or removing it. The first suggestion requires extensive measures and actions to improve the image of wine, which is “made in Portugal”. The results of this study show the need of increasing the awareness of Vinho Verde among German consumers and indicate the need of improvement of the perceptions about Portugal and Portuguese wine and examine possibilities for enhancing the acceptance of Portuguese wine, especially Vinho Verde in Germany.
O objetivo principal deste estudo foi o de descobrir as preferências e os padrões de consumo de vinho que caracterizam os segmentos específicos do mercado alemão para o Vinho Verde. Para este objectivo esta pesquisa exploratória utilizou um questionário auto-administrado. A escala base escolhida para a análise de cluster foi a de medição sobre a qualidade do produto percebida aplicada à marca Gazela. Foram obtidos quatros segmentos a partir da análise de cluster: (1) Objector (2), entusiasta, (3) indiferente e (4) Fruidor de Vinho Verde. Os segmentos 2 e 4 são os grupos alvos de Gazela. Os resultados sobre as associações com Portugal, o país de origem do Gazela, e vinho português demostraram relações bastante negativas. As implicações ao nível da gestão sugerem o desenvolvimento de uma campanha publicitária para promover o sucesso de Gazela na alemanha. Duas alternativas são sugeridas: manter o país de origem no rótulo ou removê-lo. A primeira sugestão requer medidas e ações mais abrangentes para melhorar a imagem do vinho "made in Portugal". Os resultados deste estudo apontam para a necessidade de aumentar a consciência sobre o Vinho Verde entre os consumidores alemães e indicam a necessidade de melhoria das percepções sobre Portugal e sobre o vinho português e de estudar as possibilidades de aumentar a aceitação de vinho português, especialmente o Vinho Verde na Alemanha.
Yan, Dacong. "Program Analyses for Understanding the Behavior and Performance of Traditional and Mobile Object-Oriented Software". The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1406064286.
Texto completo da fonteFarahbakhsh, Reza. "Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools". Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012/document.
Texto completo da fontePopular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Farahbakhsh, Reza. "Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012.
Texto completo da fontePopular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Casserly, Alison P. "Integrated Analysis of miRNA/mRNA Expression in the Neurocircuitry Underlying Nicotine Dependence". eScholarship@UMMS, 2018. https://escholarship.umassmed.edu/gsbs_diss/985.
Texto completo da fonteKumar, Tushar. "Characterizing and controlling program behavior using execution-time variance". Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/55000.
Texto completo da fonteGao, Wei. "CONSTRUCTING USER BEHAVIORAL PROFILES USING DATA-MINING-BASED APPROACH". Diss., Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1261%5F1%5Fm.pdf&type=application/pdf.
Texto completo da fonteToure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection". Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Texto completo da fonteThe increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Wu, Burton. "New variational Bayesian approaches for statistical data mining : with applications to profiling and differentiating habitual consumption behaviour of customers in the wireless telecommunication industry". Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/46084/1/Burton_Wu_Thesis.pdf.
Texto completo da fonteLivros sobre o assunto "Profiling and Behavioral Analysis"
Turvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 3a ed. Burlington, MA: Academic Press, 2008.
Encontre o texto completo da fonteTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 3a ed. Burlington, MA: Academic Press, 2008.
Encontre o texto completo da fonteTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 3a ed. Burlington, MA: Academic Press, 2008.
Encontre o texto completo da fonteTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 2a ed. London: Academic Press, 2001.
Encontre o texto completo da fonteAinswoth, Peter B. Offender profiling and crime analysis. Cullompton: Willan Pub., 2001.
Encontre o texto completo da fonteDonna, Youngs, ed. Investigative psychology: Offender profiling and the analysis of criminal action. Chichester: John Wiley & Sons, 2009.
Encontre o texto completo da fonteNapier, Mike R. Behavior, truth and deception: applying profiling and analysis to the interview process. Boca Raton, FL: CRC Press, 2010.
Encontre o texto completo da fonteBartol, Curt R. Criminal and behavioral profiling. Thousand Oaks, Calif: SAGE Publications, 2013.
Encontre o texto completo da fonteGroff, Elizabeth (Elizabeth R.) e Yang Sue-Ming, eds. The criminology of place: Street segments and our understanding of the crime problem. New York: Oxford University Press, 2012.
Encontre o texto completo da fonteFederspiel, Florian M., Gilberto Montibeller e Matthias Seifert, eds. Behavioral Decision Analysis. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-44424-1.
Texto completo da fonteCapítulos de livros sobre o assunto "Profiling and Behavioral Analysis"
Hlioui, Fedia, Nadia Aloui e Faiez Gargouri. "Automatic Deduction of Learners’ Profiling Rules Based on Behavioral Analysis". In Computational Collective Intelligence, 233–43. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67074-4_23.
Texto completo da fonteAcien, Alejandro, Aythami Morales, Ruben Vera-Rodriguez e Julian Fierrez. "Keystroke Mobile Authentication: Performance of Long-Term Approaches and Fusion with Behavioral Profiling". In Pattern Recognition and Image Analysis, 12–24. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31321-0_2.
Texto completo da fonteShosha, Ahmed F., Joshua I. James, Alan Hannaway, Chen-Ching Liu e Pavel Gladyshev. "Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes". In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 66–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39891-9_5.
Texto completo da fonteFan, Xiao-Xi, Kam-Pui Chow e Fei Xu. "Web User Profiling Based on Browsing Behavior Analysis". In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 57–71. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-662-44952-3_5.
Texto completo da fonteNordahl, Christian, Veselka Boeva, Håkan Grahn e Marie Persson Netz. "Profiling of Household Residents’ Electricity Consumption Behavior Using Clustering Analysis". In Lecture Notes in Computer Science, 779–86. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22750-0_78.
Texto completo da fonteColombini, Clara Maria, Antonio Colella, Marco Mattiucci e Aniello Castiglione. "Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel". In Lecture Notes in Computer Science, 416–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32498-7_31.
Texto completo da fontePatterson, Wayne, e Cynthia E. Winston-Proctor. "Profiling". In Behavioral Cybersecurity, 35–44. First edition. | Boca Raton : CRC Press, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003052029-5.
Texto completo da fontePatterson, Wayne, e Cynthia E. Winston-Proctor. "Profiling". In Behavioral Cybersecurity, 43–50. Boca Raton : Taylor & Francis, CRC Press, 2019.: CRC Press, 2019. http://dx.doi.org/10.1201/9780429461484-5.
Texto completo da fonteBarkhashree e Parneeta Dhaliwal. "Reinforcing Digital Forensics Through Intelligent Behavioural Evidence Analysis: Social Media Hate Speech Profiling". In Artificial Intelligence and Speech Technology, 641–50. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95711-7_52.
Texto completo da fonteKhera, Varin, Anand R. Prasad e Suksit Kwanoran. "Online Tracking and Behavioral Profiling". In Open Source Intelligence (OSINT) – A practical Introduction, 23–31. New York: River Publishers, 2024. http://dx.doi.org/10.1201/9788770047180-3.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Profiling and Behavioral Analysis"
Drachen, Anders, James Green, Chester Gray, Elie Harik, Patty Lu, Rafet Sifa e Diego Klabjan. "Guns and guardians: Comparative cluster analysis and behavioral profiling in destiny". In 2016 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 2016. http://dx.doi.org/10.1109/cig.2016.7860423.
Texto completo da fonteSingh, Malvika, B. M. Mehtre e S. Sangeetha. "User Behavior Profiling using Ensemble Approach for Insider Threat Detection". In 2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA). IEEE, 2019. http://dx.doi.org/10.1109/isba.2019.8778466.
Texto completo da fonteChen, Cheng-Yu, e Shun-Wen Hsiao. "IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis". In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9005981.
Texto completo da fonteXu, Kuai, Feng Wang e Bin Wang. "Behavior Profiling and Analysis in Wireless Home Networks". In 2010 7th IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2010. http://dx.doi.org/10.1109/ccnc.2010.5421571.
Texto completo da fonteShen, Xipeng, Michael L. Scott, Chengliang Zhang, Sandhya Dwarkadas, Chen Ding e Mitsunori Ogihara. "Analysis of input-dependent program behavior using active profiling". In the 2007 workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1281700.1281705.
Texto completo da fonteBerube, Paul, e Jose Nelson Amaral. "Combined profiling: A methodology to capture varied program behavior across multiple inputs". In 2012 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS). IEEE, 2012. http://dx.doi.org/10.1109/ispass.2012.6189227.
Texto completo da fonteGopal, Akshay C., e Lija Jacob. "Customer Behavior Analysis Using Unsupervised Clustering and Profiling: A Machine Learning Approach". In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2022. http://dx.doi.org/10.1109/icacite53722.2022.9823646.
Texto completo da fonteNeal, Tempestt, e Damon Woodard. "Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection". In 2019 International Conference on Biometrics (ICB). IEEE, 2019. http://dx.doi.org/10.1109/icb45273.2019.8987407.
Texto completo da fonteMao, Yilin, Caroline Godefroy e Michel Gysen. "Field Applications of Quantitative Fracture Diagnostic From Distributed Temperature Warmback Analysis". In SPE Hydraulic Fracturing Technology Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/212380-ms.
Texto completo da fonteAdil, Mohamed, Lingies Santhirasekaran, Nabilla Arief Tham e Brian Seabrook. "Injection Profiling for Intelligently Completed Wells Equipped with Fiber Optics". In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211402-ms.
Texto completo da fonteRelatórios de organizações sobre o assunto "Profiling and Behavioral Analysis"
Del Valle, Emiliano Diaz, Chaning Jang e Steve Wendel. Behavioral Systems: Combining behavioral science and systems analysis. Busara, janeiro de 2024. http://dx.doi.org/10.62372/fmjl3064.
Texto completo da fonteStevenson, Mark. Individual Profiling Using Text Analysis. Fort Belvoir, VA: Defense Technical Information Center, abril de 2016. http://dx.doi.org/10.21236/ad1009417.
Texto completo da fonteKolencik, Marian. A critical evaluation of the risk indicators of criminal conduct involving CBRN and explosive materials - Behavioural and observational analysis in crime detection and investigation. ISEM Institute, n.p.o., outubro de 2023. http://dx.doi.org/10.52824/vzrb5079.
Texto completo da fonteMarinucci, Antonio. ACIP Pile Installation, Installation Monitoring, Full-scale Load Testing, and Extraction Program. Deep Foundations Institute, dezembro de 2017. http://dx.doi.org/10.37308/cpf-2016-acip-1.
Texto completo da fonteBrauer, Douglas C., Daniel Henry e George A. Matzkanin. ACE/AACE Inspection and Analysis Handbook. Part 3. Profiling. Fort Belvoir, VA: Defense Technical Information Center, junho de 1985. http://dx.doi.org/10.21236/ada210049.
Texto completo da fonteAcemoglu, Daron, e Martin Kaae Jensen. Equilibrium Analysis in the Behavioral Neoclassical Growth Model. Cambridge, MA: National Bureau of Economic Research, dezembro de 2018. http://dx.doi.org/10.3386/w25363.
Texto completo da fontePetry, Nancy, e Warren Bickel. A Behavioral Economic Analysis of Polydrug Abuse in Heroin Addicts. Cambridge, MA: National Bureau of Economic Research, fevereiro de 1998. http://dx.doi.org/10.3386/w6415.
Texto completo da fonteSilverman, Kenneth, e Elias Robles. Employment as a Drug Abuse Treatment Intervention: A Behavioral Economic Analysis. Cambridge, MA: National Bureau of Economic Research, fevereiro de 1998. http://dx.doi.org/10.3386/w6402.
Texto completo da fonteCoker, Ray. Toward a behavioral analysis of attentiveness as a style of communication. Portland State University Library, janeiro de 2000. http://dx.doi.org/10.15760/etd.3227.
Texto completo da fonteBernheim, B. Douglas, e Antonio Rangel. Behavioral Public Economics: Welfare and Policy Analysis with Non-Standard Decision-Makers. Cambridge, MA: National Bureau of Economic Research, agosto de 2005. http://dx.doi.org/10.3386/w11518.
Texto completo da fonte