Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies, , , and . Intelligence and Security Informatics, volume 5075 of Lecture Notes in Computer Science, Springer, Berlin / Heidelberg, (2008)Modeling Suspicious Email Detection using Enhanced Feature Selection., , , and . CoRR, (2013)Semantic Analysis of FBI News Reports., and . ICONIP (4), volume 7666 of Lecture Notes in Computer Science, page 322-329. Springer, (2012)Structural Analysis and Destabilizing Terrorist Networks., and . DMIN, page 296-302. CSREA Press, (2006)Extended approximate string matching algorithms to detect name aliases., , and . ISI, page 216-219. IEEE, (2011)Crime Analysis using Open Source Information., , , , , and . CoRR, (2019)Verification-driven slicing of UML/OCL models., , , and . ASE, page 185-194. ACM, (2010)Cluster Based Text Classification Model., , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level., , and . SADFE, page 133-140. IEEE Computer Society, (2010)CCM: A Text Classification Model by Clustering., , , and . ASONAM, page 461-467. IEEE Computer Society, (2011)