 
			
			
			Search
Full Listing
2336 Library Entries
                Clear
                    Search
                                    
                        
                            
                            
                     
                                            
                                
        | Type | Title | Year | Author | Links | 
|---|---|---|---|---|
|  | Banning Encryption to Stop Terrorists: A Worse than Futile Exercise View Abstract | 2017 | Brantly, A. | View Publisher | 
|  | Terrorist Use of Virtual Currencies View Abstract | 2017 | Goldman, Z., Maruyama, E., Rosenberg, E., Saravalle, E. and Solomon-Strauss, J. | View Publisher | 
|  | Beyond Online Radicalisation: Exploring Transnationalism of Jihad View Abstract | 2017 | Mahlouly, D. | View Publisher | 
|  | Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes View Abstract | 2017 | Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M. and Horgan, J. | View Publisher | 
|  | Neue technologische Mittel des neuen Terrorismus View Abstract | 2017 | Goertz, S. | View Publisher | 
|  | Fishermen or Swarm Dynamics? Should we Understand Jihadist Online-Radicalization as a Top-Down or Bottom-Up Process? View Abstract | 2017 | Baaken, T., and Schlegel, L. | View Publisher |