text
stringlengths
16
120
<Risk_Based Security Measures, analyzes, Port Security>
<Risk_Based Security Measures, connectedTo, Military Counterterrorism>
<Vulnerability Assessment, connectedTo, Forensic Investigation of Attacks>
<Vulnerability Assessment, connectedTo, Military Counterterrorism>
<Vulnerability Assessment, connectedTo, Port Security>
<Vulnerability Assessment, connectedTo, Risk Analysis>
<Vulnerability Assessment, connectedTo, Risk_Based Security Measures>
<Behavioral Threat Assessment, evidence_collects, Intelligence Gathering>
<Bomb Disposal, connectedTo, Port Security>
<Border Security, laws_enforces, Vulnerability Assessment>
<Counter_Propaganda, connectedTo, Border Security>
<Counter_Propaganda, connectedTo, Public Awareness Campaigns>
<Intelligence Analysis, connectedTo, Surveillance and Monitoring>
<Intelligence Analysis, partOf, Target Hardening>
<Intelligence Gathering, connectedTo, Counter_Propaganda>
<Intelligence Gathering, connectedTo, Intelligence Analysis>
<Intelligence Gathering, connectedTo, Vulnerability Assessment>
<Intelligence Gathering, crisis_manages, Border Security>
<Intelligence Gathering, secures, Public Awareness Campaigns>
<Port Security, connectedTo, Risk_Based Security Measures>
<Public Awareness Campaigns, vulnerabilities_reduces, Border Security>
<Radicalization Prevention, connectedTo, Behavioral Threat Assessment>
<Risk Analysis, connectedTo, Radicalization Prevention>
<Surveillance and Monitoring, connectedTo, Port Security>
<Surveillance and Monitoring, partOf, Target Hardening>
<Transportation Security, connectedTo, Risk Analysis>
<Vulnerability Assessment, connectedTo, Bomb Disposal>
<Vulnerability Assessment, connectedTo, Port Security>
<Vulnerability Assessment, connectedTo, Risk_Based Security Measures>
<Access Control Systems, connectedTo, GPS Tracking>
<Anomaly Detection, connectedTo, Border Surveillance>
<Anomaly Detection, connectedTo, Perimeter Security>
<Anomaly Detection, tracks, Access Control Systems>
<Border Surveillance, complies, Physical Security Integration>
<Cyber Surveillance, connectedTo, Predictive Policing>
<Cyber Surveillance, partOf, Facial Recognition Systems>
<Data Storage and Retention, connectedTo, Perimeter Security>
<Environmental Monitoring, alerts, Physical Security Integration>
<Environmental Monitoring, partOf, Facial Recognition Systems>
<Ethical Guidelines, connectedTo, Access Control Systems>
<Ethical Guidelines, connectedTo, Anomaly Detection>
<Ethical Guidelines, monitors, Physical Security Integration>
<GPS Tracking, connectedTo, Border Surveillance>
<Night Vision Technology, connectedTo, Ethical Guidelines>
<Night Vision Technology, evidence_gathers, Border Surveillance>
<Physical Security Integration, connectedTo, Cyber Surveillance>
<Physical Security Integration, connectedTo, Social Media Monitoring>
<Predictive Policing, connectedTo, Environmental Monitoring>
<Predictive Policing, partOf, Facial Recognition Systems>
<Social Media Monitoring, ethical_considers, Perimeter Security>
<Social Media Monitoring, manages, Data Storage and Retention>
<Automated Threat Detection, connectedTo, Environmental Monitoring>
<Border Surveillance, connectedTo, Ethical Guidelines>
<Data Storage and Retention, captures, Border Surveillance>
<Data Storage and Retention, connectedTo, Automated Threat Detection>
<Data Storage and Retention, connectedTo, Biometric Data Analysis>
<Data Storage and Retention, transmits, Network Monitoring>
<Environmental Monitoring, connectedTo, Remote Sensing>
<Environmental Monitoring, connectedTo, Social Media Monitoring>
<Ethical Guidelines, connectedTo, Automated Threat Detection>
<Facial Recognition Systems, observes, Data Storage and Retention>
<Intrusion Detection, connectedTo, Ethical Guidelines>
<Intrusion Detection, partOf, Mobile Phone Interception>
<Network Monitoring, connectedTo, Biometric Data Analysis>
<Remote Sensing, connectedTo, Ethical Guidelines>
<Remote Sensing, connectedTo, Intrusion Detection>
<Remote Sensing, partOf, Mobile Phone Interception>
<Social Media Monitoring, connectedTo, Network Monitoring>
<Access Control Systems, audits, Sensor Network Deployment>
<Access Control Systems, connectedTo, Automated Threat Detection>
<Access Control Systems, retrieves, Mobile Phone Interception>
<Anomaly Detection, connectedTo, Asset Tracking>
<Anomaly Detection, partOf, Public Space Monitoring>
<Asset Tracking, connectedTo, Wildlife Tracking>
<Asset Tracking, partOf, Public Space Monitoring>
<Audio Surveillance, connectedTo, Sensor Network Deployment>
<Automated Threat Detection, connectedTo, Pattern Recognition>
<Behavioral Analytics, partOf, Public Space Monitoring>
<Behavioral Analytics, receives, Anomaly Detection>
<Cyber Surveillance, connectedTo, Automated Threat Detection>
<Cyber Surveillance, evidence_gathers, Access Control Systems>
<Environmental Monitoring, connectedTo, GPS Tracking>
<GPS Tracking, authenticates, Real_time Alerts>
<GPS Tracking, connectedTo, Cyber Surveillance>
<Legal Compliance, connectedTo, Video Analytics>
<Mobile Phone Interception, reports, Audio Surveillance>
<Pattern Recognition, deploys, Mobile Phone Interception>
<Privacy Concerns Mitigation, accesses, Automated Threat Detection>
<Privacy Concerns Mitigation, connectedTo, Cyber Surveillance>
<Privacy Concerns Mitigation, processes, Environmental Monitoring>
<Real_time Alerts, connectedTo, Behavioral Analytics>
<Real_time Alerts, connectedTo, Legal Compliance>
<Video Analytics, connectedTo, Cyber Surveillance>
<Wildlife Tracking, partOf, Public Space Monitoring>
<Wildlife Tracking, visualizes, Real_time Alerts>
<Agricultural Research, connectedTo, Precision Farming>
<Barn Cleaning, certifies, Fencing Installation>
<Barn Cleaning, connectedTo, Supply Chain to Retailers>
<Crop Rotation Planning, controls, Yield Prediction>
<Disease Detection, connectedTo, Agricultural Research>