Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating Terrorist Attacks Using CDR Data: A Case Study., , , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)Interview with Ben Shneiderman.. SIGWEB Newsl., 2019 (Spring): 1:1-1:4 (2019)Interview with Peter King.. SIGWEB Newsl., 2011 (Spring): 2:1-2:7 (2011)Interview with Eelco Herder.. SIGWEB Newsl., 2016 (Winter): 2:1-2:5 (2016)Interview with Wendy Hall.. SIGWEB Newsl., 2007 (Spring): 1:1-1:4 (2007)Interview with Ken Anderson.. SIGWEB Newsl., 2013 (Spring): 2:1-2:4 (2013)Supporting emergent knowledge and team communication in police investigations., , and . ISI, page 95-100. IEEE, (2009)Incorporating data sources and methodologies for crime data mining., , , and . ISI, page 176-180. IEEE, (2011)Looking Beyond Computer Applications: Investigating Rich Structures., and . Metainformatics, volume 3511 of Lecture Notes in Computer Science, page 51-65. Springer, (2004)Interview with Alessio Antonini.. SIGWEB Newsl., 2023 (Summer): 3:1-3:4 (2023)