Massachusetts Institute of Technology
Sign in Create Account

R. Scott Kemp

Professor R. Scott Kemp is looking at how to move past traditional technical modes of verification by using open source literature as a way to detect clandestine nuclear programs.

Comments (0)

You need to log in, in order to post comments. If you don’t have an account yet, sign up now!

Research Thumbnails

Research Thumbnails

Category: Engineering | Updated 11 months ago

Created
February 17, 2014 14:06
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
2276 times

More from Research Thumbnails

Ju Li

Ju Li

Added 2 years ago | 00:00:52 | 2442 views

Areg Danagoulian

Areg Danagoulian

Added 11 months ago | 00:01:38 | 1683 views

Dennis Whyte

Dennis Whyte

Added over 1 year ago | 00:03:14 | 2777 views

Ju Li

Ju Li

Added over 1 year ago | 00:02:16 | 3309 views

Bilge Yildiz

Bilge Yildiz

Added over 1 year ago | 00:01:00 | 3429 views

Jacopo Buongiorno

Jacopo Buongiorno

Added 2 years ago | 00:00:43 | 2090 views