Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks., and . Decis. Support Syst., 38 (3): 473-487 (2004)Untangling Criminal Networks: A Case Study., and . ISI, volume 2665 of Lecture Notes in Computer Science, page 232-248. Springer, (2003)Extracting Meaningful Entities from Police Narrative Reports., , and . DG.O, Digital Government Research Center, (2002)Understanding the Nexus of Terrorist Web Sites., and . Intelligence and Security Informatics, volume 135 of Studies in Computational Intelligence, Springer, (2008)Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism., , , , , , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 125-145. Springer, (2004)Social Network Data Mining: Research Questions, Techniques, and Applications., , , and . Data Mining for Social Network Data, volume 12 of Annals of Information Systems, Springer, (2010)Does Appearance Matter? Exploring the Role of Facial Features for Judging Borrowers' Credibility in Online P2P Lending Markets., and . ISI, page 170-172. IEEE, (2019)Identifying features for detecting fraudulent loan requests on P2P platforms., , and . ISI, page 79-84. IEEE, (2016)CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis., , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 168-180. Springer, (2003)Word of Mouth Marketing through Online Social Networks., , , and . AMCIS, page 291. Association for Information Systems, (2009)