Laboratory for Unconventional Conflict Analysis & Simulation ...
www.computationalsecuritystudies.org/
Error! The "meta description" is missing, the page has no summary description!
- Select one version of your site as main and make a redirect from other versions to that one.
- Avoid using deprecated HTML tags.
URL
Domain : www.computationalsecuritystudies.org/
Character length : 37
Title
Laboratory for Unconventional Conflict Analysis & Simulation – Order in Chaos
Keywords (meta keywords)
Good! The website does not use “meta keywords”.
Open Graph Protocol
Good! The OG (Open Graph) protocol is set on this website.
type: website
title: Laboratory for Unconventional Conflict Analysis & Simulation
description: Order in Chaos
url: http://css-lucas.com/
site_name: Laboratory for Unconventional Conflict Analysis & Simulation
image: https://s0.wp.com/i/blank.jpg
locale: en_US
Dublin Core
Dublin Core is not used
Underscores in the URLs
Good! No underscore (_) found in the URLs.
Search engine friendly URLs
Good! The website uses SEO friendly URLs.
Checking the robots.txt file
There is robots.txt file.
https://computationalsecuritystudies.org/robots.txt
https://computationalsecuritystudies.org/robots.txt
User-agent | Disallowed for the search engines |
---|---|
* |
|
Social Engagement
No info found.
Doctype
HTML 5
Encoding
Perfect! The character encoding is set: UTF-8.
Language
We have found the language localisation: ”en”.
Title
Laboratory for Unconventional Conflict Analysis & Simulation – Order in Chaos
Character length : 87
Improve! The website address (title) should be between 10 and 70 characters in length.
Character length : 87
Improve! The website address (title) should be between 10 and 70 characters in length.
Text / HTML ratio
Ratio : 19%
Acceptable! The text / code ratio is between 15 and 25 percent.
Acceptable! The text / code ratio is between 15 and 25 percent.
Headings
H1 | H2 | H3 | H4 | H5 | H6 |
---|---|---|---|---|---|
1 | 6 | 27 | 0 | 1 | 0 |
Heading structure in the source code
- <H1> WELCOME TO LUCAS
- <H2> OUR PROJECTS
- <H3> After ISIL One Day Conference
- <H3> Resources and Resiliency
- <H3> Course of Action Simulator
- <H3> Computational Security Studies
- <H3> Cultural Discourses Analytics
- <H3> Social Network Analysis
- <H2> About Us
- <H5> OUR TEAM
- <H3> Tony Rivera
- <H3> James Wu
- <H3> Max Erdemandi
- <H3> Nikita Zemlevskiy
- <H3> Guan-Wun Hao
- <H3> Vinay Kshirsagar
- <H3> Brian Hur
- <H3> James Rees
- <H2> Partners & collaborators
- <H3> Social Science Research Institute
- <H3> Triangle Institute for Security Studies
- <H3> Minerva Initiative Department of Defense
- <H3> United States Army Research Office
- <H3> U.S. Army Special Operations Command
- <H3> National Counter terrorism Center
- <H3> Intelligent Automation, Inc
- <H3> Middle East Research Institute
- <H2> Our Motivation
- <H3> LUCAS EVENTS
- <H2> Publications
- <H3> Resources and Resiliency
- <H3> Mapping Hizb’allah and Al Quds
- <H3> Social Movements and Conflict
- <H3> Technical Supplement for CAS
- <H2> Get in touch
Word cloud
- lucas22
- security19
- research17
- science12
- studies11
- social9
- developer9
- work8
- lab8
- analysis8
- duke8
- institute8
- academic7
- action7
- conflict7
- states6
- james6
- computer6
- international6
- simulator6
- army5
- time5
- national5
- resiliency5
- complex5
- both5
- university5
- tony5
- course5
- projects5
- opportunities4
- students4
- experience4
- get4
- political4
- max4
- minerva4
- make4
- student4
- working4
- cas4
- resources4
- computational4
- developing4
- analytics4
- nikita4
- special4
- analytical4
- modeling4
- sophomore4
- threats4
- after4
- team4
- environment4
- strategic4
- technical3
- how3
- background3
- subject3
- middle3
Keyword matrix
word | title | descriptions | heading |
---|---|---|---|
lucas | |||
security | |||
research | |||
science | |||
studies | |||
social |
Two Word cloud
- security studies7
- national security4
- duke university4
- simulator cas3
- computer science3
- network analysis3
Three Word cloud
- course of action simulator2
- social science research2
- studying computer science2
- army special operations2
- computational security studies2
404 Page
The website has a 404 error page.
Flash content
Good! The website does not have any flash contents.
Frame
Good! The website does not use iFrame solutions.
Images
We found 15 images on this web page.
Alternate attributes for the following 2 images are missing. Search engines use "alt" tags to understand image content efficiently. We strongly recommend fixing this issue.
Alternate attributes for the following 2 images are missing. Search engines use "alt" tags to understand image content efficiently. We strongly recommend fixing this issue.
Flesch–Kincaid Grade Level
8.60
Flesch Reading Ease
49.90
Coleman Liau Index
12.00
Automated Readability Index (ARI)
6.80
Dale–Chall Readability
7.90
SMOG Index
11.20
Spache Readibility
5.00
Number of letters
12004
Number of words
2387
Number of sentences
263
Average words per sentences
9
Number of syllables
4168
Syllables in words
4085
Average syllables in words
1.75
Number of words in first three syllables
507
Percentage of word / syllables
21.24
Words not in Dale-Chall easy-word list
1126
Words not in Spache easy-word list
568
Mobile optimization
This website is optimal for mobile devices!
Deprecated HTML elements
Good! No deprecated HTML tags are detected.
Redirection (www / not www)
Error! The web address is accessible with and without www!
Deprecated HTML elements
Good! No deprecated HTML tags are detected.
Printability
Suggestion! Unfortunately, no printer-friendly CSS found.
Meta Tag (viewport tag, mobile devices)
Error! The meta tag named viewport is missing.
Server response time
The server response time is not fast enough: 1.3 seconds have passed until the page started to load.
Loading time
4,656 ms
Table layout
Good! No nested tables found.
Number of HTTP resources
73
Number of source domains
8
Render blocking resources
The elements below are blocking the “above the fold” rendering.
List of render blocking javascript files
List of render blocking javascript files
- http://css-lucas.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
- http://css-lucas.com/.. /jquery-migrate.min.js?ver=1.4.1
- http://css-lucas.com/wp-includes/js/jquery/ui/core.min.js?ver=1.11.4
- http://css-lucas.com/.. /widget.min.js?ver=1.11.4
- http://css-lucas.com/.. /position.min.js?ver=1.11.4
- http://css-lucas.com/.. /mouse.min.js?ver=1.11.4
- http://css-lucas.com/.. /sortable.min.js?ver=1.11.4
- http://css-lucas.com/.. /datepicker.min.js?ver=1.11.4
- http://css-lucas.com/wp-includes/js/jquery/ui/menu.min.js?ver=1.11.4
- http://css-lucas.com/wp-includes/js/wp-a11y.min.js?ver=4.8.3
- http://css-lucas.com/.. /autocomplete.min.js?ver=1.11.4
- http://css-lucas.com/.. /resizable.min.js?ver=1.11.4
- http://css-lucas.com/.. /draggable.min.js?ver=1.11.4
- http://css-lucas.com/.. /button.min.js?ver=1.11.4
- http://css-lucas.com/.. /dialog.min.js?ver=1.11.4
- http://css-lucas.com/.. /events-manager.js?ver=5.7
- http://css-lucas.com/.. /scripts-general.js?ver=2.1.0
- http://css-lucas.com/.. /simple-payments.css?ver=4.8.3
- http://css-lucas.com/.. /styles.css?ver=4.9
- http://css-lucas.com/.. /events_manager.css?ver=5.7
- http://css-lucas.com/.. /front.css?ver=2.1.0
- http://fonts.googleapis.com/css?family=Open+Sans%3A300%2C300italic%2...
- http://css-lucas.com/.. /bootstrap.css?ver=4.8.3
- http://css-lucas.com/.. /font-awesome.min.css?ver=v1
- http://css-lucas.com/wp-content/themes/zerif-lite/style.css?ver=v1
- http://css-lucas.com/.. /responsive.css?ver=v1
- http://css-lucas.com/.. /style-mobile.css?ver=v1
- https://fonts.googleapis.com/css?family=Open+Sans%3A300italic%2C400it...
- http://css-lucas.com/.. /jetpack.css?ver=5.2.1
Javascript
Good! Just a few javascript files are detected on the website.
File size of all javascript files combined
472.21KB
Javascript minifying
You can save 8.2KB (27% compression) on the analysed URL by minifying the javascript files.
CSS
Good! Just a few CSS files are used on this website.
File size of all css files combined
392.77KB
CSS minifying
You can save 5.9KB (20% compression) on the analysed URL by minifying the CSS files.
- By minifying http://css-lucas.com/wp-content/themes/zerif-lite/style.css?ver=v1 you can save 4.7KB (20% compression rate)
- By minifying http://css-lucas.com/.. /events_manager.css?ver=5.7 you can save 856B (22% compression rate)
- By minifying http://s.gravatar.com/css/hovercard.css?ver=2018Maraa you can save 234B (13% compression rate)
- By minifying http://css-lucas.com/.. /responsive.css?ver=v1 you can save 152B (23% compression rate)
Uncompressed size of the of the HTML
61.44KB
Gzip compression
Your site uses compression.
Number of static resources (image, JS, CSS)
33
Browser cache
The browser cache is not set correctly for all elements.
URL | Duration |
---|---|
http://computationalsecuritystudies.org/.. /MINERVA-INITIATIVE-SIZED.png | Expiry time is not specified |
http://computationalsecuritystudies.org/.. /WORLD-2-2400-1200.jpg | Expiry time is not specified |
http://computationalsecuritystudies.org/.. /CAS-3.jpg | Expiry time is not specified |
http://computationalsecuritystudies.org/.. /CSS-3.jpg | Expiry time is not specified |
http://computationalsecuritystudies.org/.. /SNA-2.png | Expiry time is not specified |
http://computationalsecuritystudies.org/.. /STTR-4.png | Expiry time is not specified |
http://css-lucas.com/.. /left-arrow.png | Expiry time is not specified |
http://css-lucas.com/.. /lines-dark.png | Expiry time is not specified |
http://css-lucas.com/wp-content/themes/zerif-lite/images/loading.gif | Expiry time is not specified |
http://css-lucas.com/.. /menu-icon.png | Expiry time is not specified |
http://css-lucas.com/.. /right-arrow.png | Expiry time is not specified |
http://css-lucas.com/.. /CAS-impage-slider-2-250x250.png | Expiry time is not specified |
http://css-lucas.com/.. /SISTANI-KISS-2-250x250.png | Expiry time is not specified |
http://css-lucas.com/.. /cropped-Lucas-Header-for-website-1024x21... | Expiry time is not specified |
http://css-lucas.com/.. /BARREN-LAND-2-250x250.png | Expiry time is not specified |
http://css-lucas.com/wp-content/uploads/2016/08/IAMAM-2-250x250.png | Expiry time is not specified |
http://css-lucas.com/.. /ARMY-OPERATIONS-LOGO-3.png | Expiry time is not specified |
http://css-lucas.com/wp-content/uploads/2016/09/James-Wu.jpg | Expiry time is not specified |
http://css-lucas.com/wp-content/uploads/2016/09/MAX-HEADSHOT-6.png | Expiry time is not specified |
http://css-lucas.com/wp-content/uploads/2016/09/TONY-HEAD-hp-2.jpg | Expiry time is not specified |
http://css-lucas.com/wp-content/uploads/2016/10/Hur.jpg | Expiry time is not specified |
http://css-lucas.com/wp-content/uploads/2016/10/Nikita.jpg | Expiry time is not specified |
http://css-lucas.com/wp-content/uploads/2017/08/Duffy-218x300.jpg | Expiry time is not specified |
http://css-lucas.com/wp-content/uploads/2017/08/Steed-240x300.jpg | Expiry time is not specified |
http://css-lucas.com/wp-content/uploads/2017/08/Wang-225x300.png | Expiry time is not specified |
http://css-lucas.com/wp-content/uploads/2017/09/STIx-1-300x127.png | Expiry time is not specified |
File size of all images combined
2.78MB
Image optimisation
You can save 1.5MB (75% compression) by optimising the images below:
- By lossless compressing the http://css-lucas.com/wp-content/uploads/2016/09/James-Wu.jpg you can save 1,020.6KB (99%) data.
- By lossless compressing the http://css-lucas.com/wp-content/uploads/2016/10/Nikita.jpg you can save 215.7KB (97%) data.
- By lossless compressing the http://computationalsecuritystudies.org/.. /WORLD-2-2400-1200.jpg you can save 213.4KB (35%) data.
- By lossless compressing the http://computationalsecuritystudies.org/.. /CSS-3.jpg you can save 51.7KB (81%) data.
- By lossless compressing the http://css-lucas.com/wp-content/uploads/2016/10/Hur.jpg you can save 19.8KB (41%) data.
- By lossless compressing the http://css-lucas.com/wp-content/uploads/2017/08/Steed-240x300.jpg you can save 4.5KB (24%) data.
- By lossless compressing the http://css-lucas.com/wp-content/uploads/2016/09/TONY-HEAD-hp-2.jpg you can save 2.1KB (26%) data.
- By lossless compressing the http://computationalsecuritystudies.org/.. /CAS-3.jpg you can save 934B (30%) data.
- By lossless compressing the http://css-lucas.com/.. /lines-dark.png you can save 862B (92%) data.
- By lossless compressing the http://css-lucas.com/.. /menu-icon.png you can save 857B (88%) data.
- By lossless compressing the http://css-lucas.com/.. /left-arrow.png you can save 173B (24%) data.
Alexa
10070104
We found a total of 50 different links.
Internal links: 3
External links: 47
Internal links: 3
External links: 47
External links:
Internal links:
Link text (anchor) | Link strength |
---|---|
Skip to content | |
Previous | |
Next |
IP
23.229.203.4
External hidden links
Good! No hidden external links found
Looking for eval()
Good! No eval(bas64_decode()) scripts are found
Checking for XSS vulnerability
No XSS vulnerability found
Email encryption
Warning! The website contains at least one unencrypted email address.
Favicon
Good! The website uses favicon.
- H1 : WELCOME TO LUCAS, ( 299px from top )
- H2 : OUR PROJECTS, ( 731px from top )
- H3 : After ISIL One Day Conference, ( 976px from top )
omputationalsecuritystudies.org, cxomputationalsecuritystudies.org, xomputationalsecuritystudies.org, csomputationalsecuritystudies.org, somputationalsecuritystudies.org, computationalsecuritystudies.org, omputationalsecuritystudies.org, cdomputationalsecuritystudies.org, domputationalsecuritystudies.org, cfomputationalsecuritystudies.org, fomputationalsecuritystudies.org, cvomputationalsecuritystudies.org, vomputationalsecuritystudies.org, c omputationalsecuritystudies.org, omputationalsecuritystudies.org, cmputationalsecuritystudies.org, coimputationalsecuritystudies.org, cimputationalsecuritystudies.org, cokmputationalsecuritystudies.org, ckmputationalsecuritystudies.org, colmputationalsecuritystudies.org, clmputationalsecuritystudies.org, computationalsecuritystudies.org, cmputationalsecuritystudies.org, copmputationalsecuritystudies.org, cpmputationalsecuritystudies.org, co9mputationalsecuritystudies.org, c9mputationalsecuritystudies.org, co0mputationalsecuritystudies.org, c0mputationalsecuritystudies.org, coputationalsecuritystudies.org, comnputationalsecuritystudies.org, conputationalsecuritystudies.org, comhputationalsecuritystudies.org, cohputationalsecuritystudies.org, computationalsecuritystudies.org, coputationalsecuritystudies.org, comjputationalsecuritystudies.org, cojputationalsecuritystudies.org, comkputationalsecuritystudies.org, cokputationalsecuritystudies.org, comlputationalsecuritystudies.org, colputationalsecuritystudies.org, com putationalsecuritystudies.org, co putationalsecuritystudies.org, comutationalsecuritystudies.org, compoutationalsecuritystudies.org, comoutationalsecuritystudies.org, complutationalsecuritystudies.org, comlutationalsecuritystudies.org, comp0utationalsecuritystudies.org, com0utationalsecuritystudies.org, comp-utationalsecuritystudies.org, com-utationalsecuritystudies.org, computationalsecuritystudies.org, comutationalsecuritystudies.org, comp_utationalsecuritystudies.org, com_utationalsecuritystudies.org, comptationalsecuritystudies.org, compuytationalsecuritystudies.org, compytationalsecuritystudies.org, compuhtationalsecuritystudies.org, comphtationalsecuritystudies.org, compujtationalsecuritystudies.org, compjtationalsecuritystudies.org, compuktationalsecuritystudies.org, compktationalsecuritystudies.org, compuitationalsecuritystudies.org, compitationalsecuritystudies.org, compu7tationalsecuritystudies.org, comp7tationalsecuritystudies.org, compu8tationalsecuritystudies.org, comp8tationalsecuritystudies.org, compuationalsecuritystudies.org, computrationalsecuritystudies.org, compurationalsecuritystudies.org, computfationalsecuritystudies.org, compufationalsecuritystudies.org, computgationalsecuritystudies.org, compugationalsecuritystudies.org, computhationalsecuritystudies.org, compuhationalsecuritystudies.org, computyationalsecuritystudies.org, compuyationalsecuritystudies.org, comput5ationalsecuritystudies.org, compu5ationalsecuritystudies.org, comput6ationalsecuritystudies.org, compu6ationalsecuritystudies.org, computtionalsecuritystudies.org, computaqtionalsecuritystudies.org, computqtionalsecuritystudies.org, computawtionalsecuritystudies.org, computwtionalsecuritystudies.org, computaztionalsecuritystudies.org, computztionalsecuritystudies.org, computationalsecuritystudies.org, computtionalsecuritystudies.org, computaxtionalsecuritystudies.org, computxtionalsecuritystudies.org, computastionalsecuritystudies.org, computstionalsecuritystudies.org, computaionalsecuritystudies.org, computatrionalsecuritystudies.org, computarionalsecuritystudies.org, computatfionalsecuritystudies.org, computafionalsecuritystudies.org, computatgionalsecuritystudies.org, computagionalsecuritystudies.org, computathionalsecuritystudies.org, computahionalsecuritystudies.org, computatyionalsecuritystudies.org, computayionalsecuritystudies.org, computat5ionalsecuritystudies.org, computa5ionalsecuritystudies.org, computat6ionalsecuritystudies.org, computa6ionalsecuritystudies.org, computatonalsecuritystudies.org, computatiuonalsecuritystudies.org, computatuonalsecuritystudies.org, computatijonalsecuritystudies.org, computatjonalsecuritystudies.org, computationalsecuritystudies.org, computatonalsecuritystudies.org, computatilonalsecuritystudies.org, computatlonalsecuritystudies.org, computatioonalsecuritystudies.org, computatoonalsecuritystudies.org, computati8onalsecuritystudies.org, computat8onalsecuritystudies.org, computati9onalsecuritystudies.org, computat9onalsecuritystudies.org, computati*onalsecuritystudies.org, computat*onalsecuritystudies.org, computatinalsecuritystudies.org, computatioinalsecuritystudies.org, computatiinalsecuritystudies.org, computatioknalsecuritystudies.org, computatiknalsecuritystudies.org, computatiolnalsecuritystudies.org, computatilnalsecuritystudies.org, computationalsecuritystudies.org, computatinalsecuritystudies.org, computatiopnalsecuritystudies.org, computatipnalsecuritystudies.org, computatio9nalsecuritystudies.org, computati9nalsecuritystudies.org, computatio0nalsecuritystudies.org, computati0nalsecuritystudies.org, computatioalsecuritystudies.org, computationbalsecuritystudies.org, computatiobalsecuritystudies.org, computationgalsecuritystudies.org, computatiogalsecuritystudies.org, computationhalsecuritystudies.org, computatiohalsecuritystudies.org, computationjalsecuritystudies.org, computatiojalsecuritystudies.org, computationmalsecuritystudies.org, computatiomalsecuritystudies.org, computation alsecuritystudies.org, computatio alsecuritystudies.org, computationlsecuritystudies.org, computationaqlsecuritystudies.org, computationqlsecuritystudies.org, computationawlsecuritystudies.org, computationwlsecuritystudies.org, computationazlsecuritystudies.org, computationzlsecuritystudies.org, computationalsecuritystudies.org, computationlsecuritystudies.org, computationaxlsecuritystudies.org, computationxlsecuritystudies.org, computationaslsecuritystudies.org, computationslsecuritystudies.org