[1] | Ansary, A., 2017, Combating extremism: a brief overview of Saudi Arabia’s approach, Middle East Policy Council, Retrieved from: http://www.mepc.org/combating-extremism-brief-overview-saudi-arabias-approach. |
[2] | Asmat, A., 2010, The role of remote sensing in fighting against terrorism – a case of Pakistan, IAPRS, XXXVIII, Retrieved from: http://www.isprs.org/proceedings/XXXVIII/part7/b/pdf/32_XXXVIII-part7B.pdf. |
[3] | ArcGIS, 2017, How kernel density works, Retrieved from: https://0x9.me/D6u5Q. |
[4] | Audu, A.I., and Sadka, A.H., 2014, Virtual viewpoint three-dimensional panorama, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 4(6), Retrieved from: http://airccse.org/journal/ijcseit/papers/4614ijcseit02.pdf. |
[5] | Bernsen, N.O., and Dybkjaer, L., 2009, Multimodal usability, Springer. |
[6] | Boerma, I.E., Mol, S.E., and Jolles, J., 2016, Reading pictures for story comprehension requires mental imagery skills, Front Psychology, 7(16300), Retrieved from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5075566/. |
[7] | Bourgeouis, D.T., n.d., Chapter 4: Data and Databases, Retrieved from: https://bus206.pressbooks.com/chapter/chapter-4-data-and-databases/. |
[8] | Bruntstetter, D., 2012, Drones: the future of warfare? E-International Relations, Retrieved from: http://www.e-ir.info/2012/04/10/drones-the-future-of-warfare/. |
[9] | Chandrakar, S., and Thomas, A., 2010, Detection and prevention of terrorist activities using GIS and remote sensing, International Journal of Computer Applications, 1(14), DOI: 10.5120/311-478, Retrieved from: https://0x9.me/50FTi. |
[10] | Croner, C.M., 2004, Public Health GIS and the internet, Journal of Map and Geography Libraries, 1(1), 105-135, DOI: 10.1300/J230v01n01_07. |
[11] | Change Institute, 2008, Studies into violent radicalisation: the beliefs ideologies and narratives, Retrieved from: https://0x9.me/2xFfV. |
[12] | Can, S.H., and Leipnik, M.R., 2010, Use of Geographic Information Systems in counterterrorism, ResearchGate, Retrieved from: https://0x9.me/hOfLs. |
[13] | Carter, J., Schmid, K., Waters, K., Betzhold, L., Hadley, B., Mataosky, R. and Jennifer H.J., 2012, An introduction to lidar technology, data, and applications, 2(1), 40-50, Retrieved from: https://coast.noaa.gov/data/digitalcoast/pdf/lidar-101.pdf. |
[14] | Can, S.H., and Leipnik, M.R., 2010, Use of Geographic Information Systems in counterterrorism, Professional Issues in Criminal Justice 5(1), Retrieved from: https://0x9.me/VxeSu. |
[15] | Dycus, S., Banks, W.C., Raven-Hansen, P., and Vladeck, S.I., 2016, Counterterrorism Law, Wolters Kluwer Law & Business, New York. |
[16] | De By, R., 2001, The GIS as a set of specialized procedures capable of storing and manipulating geographically referenced data, which means objects with a defined location on the earth’s surface and under a conventional coordinate system, ITC, Retrieved from: http://www.gdmc.nl/oosterom/PoGISHyperlinked.pdf. |
[17] | Dempsy, C., 2011, Historical Geography and GIS, GIS Lounge, Retrieved from: https://www.gislounge.com/historical-geography-and-gis/. |
[18] | Deogawanka, S., 2015, How GIS supports the fights against terrorism, GIS Learning, Retrieved from: http://www.bbc.com/news/world-europe-30708237. |
[19] | Difiglio, C., 2014, Oil, economic growth and strategic petroleum stocks, Energy Strategy Reviews, 5, 48-58. Retrieved from: http://www.sciencedirect.com/science/article/pii/S2211467X14000443. |
[20] | European Parliament, 2014, Preventing and countering youth radicalization in the EU, Retrieved from: https://0x9.me/j0G5p. |
[21] | Furnell, S.M., and Warren, M.J., 1999, Computer hacking and cyber terrorism: the real threats in the new millennium? Computers and Security, 18; 28-34. |
[22] | Gertler, J., 2012, U.S. unmanned aerial systems, defense technical information center, Retrieved from: http://www.dtic.mil/docs/citations/ADA566235. |
[23] | Guardia, A.L., 2006, Saudis tackle terrorists with the gentle art of persuasion, The Telegraph, Retrieved from: https://0x9.me/cpr2K. |
[24] | Haney, J., 2017, A geographic approach for teaching about terrorism, Journal of Geography, 116(6); 250-262. |
[25] | Helms, R., 2011, GPS outdoors, Menasha Ridge Press, Birmingham, AL. |
[26] | Hudson, R.A., 1999, The sociology and psychology of terrorism: who becomes a terrorist and why?, Library of Congress, Retrieved from: https://www.loc.gov/rr/frd/pdf-files/Soc_Psych_of_Terrorism.pdf. |
[27] | Lo, C.P., and Yeung, A.K.W., 2007, Concepts and Techniques of Geographic Information Systems, Pearson Prentice Hall. |
[28] | Magnotta, J., 2015, Use of Drones in GIS, Retrieved from https://www.gislounge.com/use-drones-gis/. |
[29] | Medina, R.M., Siebeneck, L.K., and Hepner, G.F., 2011, A Geographic Information Systems (GIS) analysis of spatiotemporal patterns of terrorist incidents in Iraq 2004–2009, Studies in Conflict and Terrorism, 34(11); 862-882, DOI: 10.1080/1057610X.2011.611933. |
[30] | Mihira, V., 2015, Guru-Bhava-Phala 0/12: Few key principles, Retrieved from: https://0x9.me/2Z4ew. |
[31] | Meurant, G., 2012, The Computerized Greenhouse, Academic Press. |
[32] | Marqis, C.M., 1993, Integration of differential GPS and inertial navigation using a complementary kalman filter, Naval Postgraduate School, Retrieved from: http://www.dtic.mil/dtic/tr/fulltext/u2/a273370.pdf. |
[33] | Marina, O., Leduc, T., Rabino, G., and Karanakov, B., 2012, Integration of urban knowledge through visibility studies and pedestrian behavior analysis in Old Bazaar in Skopje, Retrieved from: https://3u3d.edpsciences.org/articles/3u3d/pdf/2012/01/3u3d_03006.pdf DOI: 10.1051/3u3d/201203006. |
[34] | National Oceanic and Atmospheric Administration (NOAA), 2017, Satellite data services – an introduction, NOAA, Retrieved from: http://www.noaasis.noaa.gov/NOAASIS/ml/satservices.html. |
[35] | National Snow & Ice Data Center, (NSIDC), 2017, Defense meteorological satellite program (DMSP) satellite F10, Retrieved from: https://nsidc.org/data/docs/daac/f10_platform.gd.html. |
[36] | Paliouras, G., Spyropoulos, C.D., and Tsatsaronis, G., (eds), 2011, Knowledge-driven multimedia information extraction and ontology evolution: bridging the semantic gap, Springer, DOI: 10.1007/978-3-642-20795-2. |
[37] | GIS Manual: Digital Elevation Models, 2017, Obtaining and transforming elevation data, Retrieved from: http://www.pbcgis.com/dem/. |
[38] | Phil for Humanity, 2017, The Pros and cons of drones, Retrieved from: http://www.philforhumanity.com/Drones.html. |
[39] | Plata et al 2012, Using a GIS Tool to Map the Spatial Distribution of Population for 2010 in the State of Mexico, Mexico, Journal of Geographic Information System, 4(1), DOI:10.4236/jgis.2012.41001. |
[40] | Profile of Saudi Arabia, Location and Size of the Kingdom, Retrieved from: http://www.saudinf.com/main/a1.htm |
[41] | Rock, N.R., 2011, Mapping geospatial events based on extracted spatial information from web documents, Iowa Research Online, Retrieved from: http://ir.uiowa.edu/cgi/viewcontent.cgi?article=2453&context=etd. |
[42] | Satyanarayana, P., and Yogendran, S., 2002, Military applications of GIS, GIS Lounge, Retrieved from: https://www.gislounge.com/military-applications-of-gis/. |
[43] | Shekhar, S. and Xiong, H., 2007, Encyclopedia of GIS, Springer Science and Business Media. |
[44] | Storm, D., 2014, Hackers exploit SCADA holes to take full control of critical infrastructure, security is sexy, Retrieved from: https://0x9.me/WYOSs. |
[45] | VanHorn, J.E., and Mosurinjohn, N.A., 2010, Urban 3D GIS modeling of terrorism sniper hazards, Social Science Computer Review 28(4); 482-496. |
[46] | Vogel, R.J., 2011, Drone warfare and the Law of Armed Conflict, Denver Journal of International Law and Policy, 39(1), Retrieved from: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1759562. |
[47] | Zhou, G., Song, C., Simmers, J., and Cheng, P., 2004, Urban 3D GIS from LIDAR and digital aerial images, Computers and Geo Sciences, 30(4): 345-353. |
[48] | Walsan, R., Pai, N., and Dawes, K., 2016, The relationship between environment and mental health: how does geographic information systems (GIS) help?, Australasian Psychiatry, 2(3); 215-316. |
[49] | Wehr, A., and Lohr, U., 1999, Airborne laser scanning—an introduction and overview, Journal of Photogrammetry & Remote Sensing, 54(2-30; 68-82, https://doi.org/10.1016/S0924-2716(99)00011-8. |
[50] | Wamda 2017, BIBAN Forum 2017, Funding is available, seek mentorship, Retrieved from: https://0x9.me/I3DLg. |