Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating corroborated crisis reports from social media data through formal concept analysis., , , and . J. Intell. Inf. Syst., 47 (2): 287-312 (2016)A survey of two-dimensional graph layout techniques for information visualisation, , and . Information Visualization, 12 (3-4): 324--357 (2013)Combining Big Social Media Data and FCA for Crisis Response., , , , and . UCC, page 690-695. IEEE Computer Society, (2014)graphTPP: A multivariate based method for interactive graph layout and analysis., and . CoRR, (2017)A social media and crowdsourcing data mining system for crime prevention during and post-crisis situations., , , , and . J. Systems and IT, 18 (4): 364-382 (2016)Processing Social Media Data for Crisis Management in Athena., and . ICGS3, volume 534 of Communications in Computer and Information Science, page 3-14. Springer, (2015)Cyber Security Certification Programmes., , , , , , , , , and 9 other author(s). CSR, page 428-435. IEEE, (2021)Deploying Semantic Web Technologies for Information Fusion of Terrorism-related Content and Threat Detection on the Web., , , , , , , , , and . WI (Companion), page 193-199. ACM, (2019)Service-Oriented Design of a Command and Control Intelligence Dashboard for Crisis Management., , , , and . UCC, page 702-707. IEEE Computer Society, (2014)Citizen Perspectives on Necessary Safeguards to the Use of AI by Law Enforcement Agencies., , and . CoRR, (2023)