text stringlengths 16 120 |
|---|
<Risk_Based Security Measures, analyzes, Port Security> |
<Risk_Based Security Measures, connectedTo, Military Counterterrorism> |
<Vulnerability Assessment, connectedTo, Forensic Investigation of Attacks> |
<Vulnerability Assessment, connectedTo, Military Counterterrorism> |
<Vulnerability Assessment, connectedTo, Port Security> |
<Vulnerability Assessment, connectedTo, Risk Analysis> |
<Vulnerability Assessment, connectedTo, Risk_Based Security Measures> |
<Behavioral Threat Assessment, evidence_collects, Intelligence Gathering> |
<Bomb Disposal, connectedTo, Port Security> |
<Border Security, laws_enforces, Vulnerability Assessment> |
<Counter_Propaganda, connectedTo, Border Security> |
<Counter_Propaganda, connectedTo, Public Awareness Campaigns> |
<Intelligence Analysis, connectedTo, Surveillance and Monitoring> |
<Intelligence Analysis, partOf, Target Hardening> |
<Intelligence Gathering, connectedTo, Counter_Propaganda> |
<Intelligence Gathering, connectedTo, Intelligence Analysis> |
<Intelligence Gathering, connectedTo, Vulnerability Assessment> |
<Intelligence Gathering, crisis_manages, Border Security> |
<Intelligence Gathering, secures, Public Awareness Campaigns> |
<Port Security, connectedTo, Risk_Based Security Measures> |
<Public Awareness Campaigns, vulnerabilities_reduces, Border Security> |
<Radicalization Prevention, connectedTo, Behavioral Threat Assessment> |
<Risk Analysis, connectedTo, Radicalization Prevention> |
<Surveillance and Monitoring, connectedTo, Port Security> |
<Surveillance and Monitoring, partOf, Target Hardening> |
<Transportation Security, connectedTo, Risk Analysis> |
<Vulnerability Assessment, connectedTo, Bomb Disposal> |
<Vulnerability Assessment, connectedTo, Port Security> |
<Vulnerability Assessment, connectedTo, Risk_Based Security Measures> |
<Access Control Systems, connectedTo, GPS Tracking> |
<Anomaly Detection, connectedTo, Border Surveillance> |
<Anomaly Detection, connectedTo, Perimeter Security> |
<Anomaly Detection, tracks, Access Control Systems> |
<Border Surveillance, complies, Physical Security Integration> |
<Cyber Surveillance, connectedTo, Predictive Policing> |
<Cyber Surveillance, partOf, Facial Recognition Systems> |
<Data Storage and Retention, connectedTo, Perimeter Security> |
<Environmental Monitoring, alerts, Physical Security Integration> |
<Environmental Monitoring, partOf, Facial Recognition Systems> |
<Ethical Guidelines, connectedTo, Access Control Systems> |
<Ethical Guidelines, connectedTo, Anomaly Detection> |
<Ethical Guidelines, monitors, Physical Security Integration> |
<GPS Tracking, connectedTo, Border Surveillance> |
<Night Vision Technology, connectedTo, Ethical Guidelines> |
<Night Vision Technology, evidence_gathers, Border Surveillance> |
<Physical Security Integration, connectedTo, Cyber Surveillance> |
<Physical Security Integration, connectedTo, Social Media Monitoring> |
<Predictive Policing, connectedTo, Environmental Monitoring> |
<Predictive Policing, partOf, Facial Recognition Systems> |
<Social Media Monitoring, ethical_considers, Perimeter Security> |
<Social Media Monitoring, manages, Data Storage and Retention> |
<Automated Threat Detection, connectedTo, Environmental Monitoring> |
<Border Surveillance, connectedTo, Ethical Guidelines> |
<Data Storage and Retention, captures, Border Surveillance> |
<Data Storage and Retention, connectedTo, Automated Threat Detection> |
<Data Storage and Retention, connectedTo, Biometric Data Analysis> |
<Data Storage and Retention, transmits, Network Monitoring> |
<Environmental Monitoring, connectedTo, Remote Sensing> |
<Environmental Monitoring, connectedTo, Social Media Monitoring> |
<Ethical Guidelines, connectedTo, Automated Threat Detection> |
<Facial Recognition Systems, observes, Data Storage and Retention> |
<Intrusion Detection, connectedTo, Ethical Guidelines> |
<Intrusion Detection, partOf, Mobile Phone Interception> |
<Network Monitoring, connectedTo, Biometric Data Analysis> |
<Remote Sensing, connectedTo, Ethical Guidelines> |
<Remote Sensing, connectedTo, Intrusion Detection> |
<Remote Sensing, partOf, Mobile Phone Interception> |
<Social Media Monitoring, connectedTo, Network Monitoring> |
<Access Control Systems, audits, Sensor Network Deployment> |
<Access Control Systems, connectedTo, Automated Threat Detection> |
<Access Control Systems, retrieves, Mobile Phone Interception> |
<Anomaly Detection, connectedTo, Asset Tracking> |
<Anomaly Detection, partOf, Public Space Monitoring> |
<Asset Tracking, connectedTo, Wildlife Tracking> |
<Asset Tracking, partOf, Public Space Monitoring> |
<Audio Surveillance, connectedTo, Sensor Network Deployment> |
<Automated Threat Detection, connectedTo, Pattern Recognition> |
<Behavioral Analytics, partOf, Public Space Monitoring> |
<Behavioral Analytics, receives, Anomaly Detection> |
<Cyber Surveillance, connectedTo, Automated Threat Detection> |
<Cyber Surveillance, evidence_gathers, Access Control Systems> |
<Environmental Monitoring, connectedTo, GPS Tracking> |
<GPS Tracking, authenticates, Real_time Alerts> |
<GPS Tracking, connectedTo, Cyber Surveillance> |
<Legal Compliance, connectedTo, Video Analytics> |
<Mobile Phone Interception, reports, Audio Surveillance> |
<Pattern Recognition, deploys, Mobile Phone Interception> |
<Privacy Concerns Mitigation, accesses, Automated Threat Detection> |
<Privacy Concerns Mitigation, connectedTo, Cyber Surveillance> |
<Privacy Concerns Mitigation, processes, Environmental Monitoring> |
<Real_time Alerts, connectedTo, Behavioral Analytics> |
<Real_time Alerts, connectedTo, Legal Compliance> |
<Video Analytics, connectedTo, Cyber Surveillance> |
<Wildlife Tracking, partOf, Public Space Monitoring> |
<Wildlife Tracking, visualizes, Real_time Alerts> |
<Agricultural Research, connectedTo, Precision Farming> |
<Barn Cleaning, certifies, Fencing Installation> |
<Barn Cleaning, connectedTo, Supply Chain to Retailers> |
<Crop Rotation Planning, controls, Yield Prediction> |
<Disease Detection, connectedTo, Agricultural Research> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.