text stringlengths 16 120 |
|---|
<Hostage Negotiation, prevents, Target Hardening> |
<Insider Threat Programs, international_cooperates, Intelligence Gathering> |
<Insider Threat Programs, partOf, Behavioral Threat Assessment> |
<Intelligence Gathering, connectedTo, Legislation and Policy Development> |
<Intelligence Gathering, partOf, Behavioral Threat Assessment> |
<International Cooperation, connectedTo, Data Analytics for Terrorism> |
<International Cooperation, connectedTo, Radicalization Prevention> |
<International Cooperation, connectedTo, Target Hardening> |
<International Cooperation, resilience_builds, Surveillance and Monitoring> |
<Legislation and Policy Development, connectedTo, Target Hardening> |
<Legislation and Policy Development, partOf, Behavioral Threat Assessment> |
<Public Awareness Campaigns, connectedTo, Hostage Negotiation> |
<Surveillance and Monitoring, connectedTo, Data Analytics for Terrorism> |
<Target Hardening, connectedTo, Bomb Disposal> |
<Target Hardening, connectedTo, Surveillance and Monitoring> |
<Terrorism Financing Interdiction, laws_enforces, Drone Countermeasures> |
<Transportation Security, weapons_interdicts, Public Awareness Campaigns> |
<Airport Security, connectedTo, Military Counterterrorism> |
<Bomb Disposal, connectedTo, Intelligence Gathering> |
<Bomb Disposal, partOf, Surveillance and Monitoring> |
<Counter_Propaganda, connectedTo, Airport Security> |
<Counter_Propaganda, partOf, Surveillance and Monitoring> |
<Crisis Response Planning, connectedTo, Information Sharing> |
<Crisis Response Planning, connectedTo, Post_Incident Recovery> |
<Crisis Response Planning, connectedTo, Transportation Security> |
<Crisis Response Planning, cyber_defends, Intelligence Analysis> |
<Crisis Response Planning, targets_protects, Airport Security> |
<Crisis Response Planning, vulnerabilities_reduces, Transportation Security> |
<Information Sharing, evidence_collects, Transportation Security> |
<Insider Threat Programs, connectedTo, Post_Incident Recovery> |
<Intelligence Analysis, connectedTo, Airport Security> |
<Intelligence Analysis, connectedTo, Bomb Disposal> |
<Intelligence Analysis, connectedTo, Information Sharing> |
<Intelligence Analysis, connectedTo, Transportation Security> |
<Intelligence Gathering, detects, Counter_Propaganda> |
<Intelligence Gathering, partOf, Surveillance and Monitoring> |
<Military Counterterrorism, connectedTo, Target Hardening> |
<Target Hardening, crisis_manages, Insider Threat Programs> |
<Transportation Security, connectedTo, Airport Security> |
<Airport Security, connectedTo, Bomb Disposal> |
<Airport Security, partOf, Drone Countermeasures> |
<Behavioral Threat Assessment, connectedTo, International Cooperation> |
<Bomb Disposal, connectedTo, Early Warning Systems> |
<Bomb Disposal, connectedTo, Terrorism Financing Interdiction> |
<Bomb Disposal, de_radicalizes, Fusion Center Operations> |
<Border Security, connectedTo, Training Exercises> |
<Border Security, partOf, Drone Countermeasures> |
<Counter_Propaganda, connectedTo, Biometric Screening> |
<Early Warning Systems, connectedTo, Fusion Center Operations> |
<Fusion Center Operations, technologies_applies, Hostage Negotiation> |
<Homeland Security Planning, connectedTo, Early Warning Systems> |
<Hostage Negotiation, impacts_assesses, Counter_Propaganda> |
<Insider Threat Programs, connectedTo, Intelligence Gathering> |
<Intelligence Gathering, connectedTo, Behavioral Threat Assessment> |
<International Cooperation, connectedTo, Biometric Screening> |
<International Cooperation, connectedTo, Hostage Negotiation> |
<International Cooperation, connectedTo, Law Enforcement Operations> |
<International Cooperation, connectedTo, Terrorism Financing Interdiction> |
<Law Enforcement Operations, connectedTo, Bomb Disposal> |
<Law Enforcement Operations, connectedTo, Terrorism Financing Interdiction> |
<Law Enforcement Operations, policies_develops, Radicalization Prevention> |
<Radicalization Prevention, cyber_defends, Border Security> |
<Radicalization Prevention, partOf, Drone Countermeasures> |
<Terrorism Financing Interdiction, connectedTo, Homeland Security Planning> |
<Training Exercises, partOf, Drone Countermeasures> |
<Training Exercises, targets_protects, Airport Security> |
<Airport Security, weapons_interdicts, Surveillance and Monitoring> |
<Biometric Screening, connectedTo, Data Analytics for Terrorism> |
<Biometric Screening, shares_info, Psychological Operations> |
<Crisis Response Planning, connectedTo, Airport Security> |
<Crisis Response Planning, incidents_responds, Training Exercises> |
<Data Analytics for Terrorism, laws_enforces, Insider Threat Programs> |
<Data Analytics for Terrorism, partOf, Risk Analysis> |
<Drone Countermeasures, connectedTo, Crisis Response Planning> |
<Drone Countermeasures, drills, Training Exercises> |
<Forensic Investigation of Attacks, technologies_applies, Behavioral Threat Assessment> |
<Insider Threat Programs, connectedTo, Public Awareness Campaigns> |
<Insider Threat Programs, partOf, Risk Analysis> |
<Psychological Operations, connectedTo, Forensic Investigation of Attacks> |
<Public Awareness Campaigns, connectedTo, Training Exercises> |
<Public Awareness Campaigns, partOf, Risk Analysis> |
<Surveillance and Monitoring, connectedTo, Training Exercises> |
<Training Exercises, connectedTo, Behavioral Threat Assessment> |
<Training Exercises, connectedTo, Biometric Screening> |
<Training Exercises, connectedTo, Psychological Operations> |
<Biometric Screening, connectedTo, Drone Countermeasures> |
<Biometric Screening, partOf, Insider Threat Programs> |
<Drone Countermeasures, disrupts, Forensic Investigation of Attacks> |
<Drone Countermeasures, partOf, Insider Threat Programs> |
<Forensic Investigation of Attacks, connectedTo, Port Security> |
<Intelligence Gathering, connectedTo, Forensic Investigation of Attacks> |
<Intelligence Gathering, connectedTo, Port Security> |
<Intelligence Gathering, connectedTo, Vulnerability Assessment> |
<Intelligence Gathering, shares_info, Legislation and Policy Development> |
<Legislation and Policy Development, connectedTo, Port Security> |
<Legislation and Policy Development, connectedTo, Vulnerability Assessment> |
<Legislation and Policy Development, laws_enforces, Forensic Investigation of Attacks> |
<Military Counterterrorism, vulnerabilities_reduces, Forensic Investigation of Attacks> |
<Risk Analysis, connectedTo, Biometric Screening> |
<Risk Analysis, partOf, Insider Threat Programs> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.