Author of the publication

Surfacing collaborated networks in dark web to find illicit and criminal content.

, , , , and . ISI, page 109-114. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

27 - A Quantitative Similarity Measure for Maps, and . Progress in Spatial Data Handling, Springer, Berlin Heidelberg, (2006)Oracle Rdb's Record Caching Model., , and . SIGMOD Conference, page 526-527. ACM Press, (1998)Location, Location, Location: Mapping Potential Canadian Targets in Online Hacker Discussion Forums., , and . EISIC, page 16-23. IEEE Computer Society, (2016)Drugs for Sale! An Analysis and Estimation of Drug Products on the Cryptomarket Ecosystem., , and . HICSS, page 3621-3630. ScholarSpace, (2023)Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler., and . ASONAM, page 1024-1027. ACM, (2015)Networking in Child Exploitation: Assessing disruption strategies using registrant information., , , , and . ASONAM, page 400-407. ACM, (2015)Comparing SVD and word2vec for analysis of malware forum posts., , and . ASONAM, page 1080-1086. ACM, (2017)Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums., , , and . ISI, page 136-141. IEEE, (2018)Comparing Methods for Detecting Child Exploitation Content Online., , and . EISIC, page 156-163. IEEE Computer Society, (2012)Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement., , , and . EISIC, page 75-82. IEEE, (2013)