Author of the publication

Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer Biomarkers.

, , , , , , , , , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effectiveness of Support Vector Machine for Crime Hot-Spots Prediction., and . Applied Artificial Intelligence, 22 (5): 433-458 (2008)Genetic algorithms based approach to database vertical partition., , and . J. Intell. Inf. Syst., 26 (2): 167-183 (2006)Automated Product Recommendation by Employing Case-Based Reasoning Agents., , and . ICEIS (2), page 515-518. (2004)A Boosting Genetic Fuzzy Classifier for Intrusion Detection Using Data Mining Techniques for Rule Pre-screening., , and . HIS, volume 105 of Frontiers in Artificial Intelligence and Applications, page 983-992. IOS Press, (2003)On personalizing Web search using social network analysis., , and . Inf. Sci., (2015)Web outlier mining: Discovering outliers from web datasets., , and . Intell. Data Anal., 9 (5): 473-486 (2005)Integrating Content and Structure into a Comprehensive Framework for XML Document Similarity Represented in 3D Space., , , and . Learning Structure and Schemas from Documents, volume 375 of Studies in Computational Intelligence, Springer, (2011)Early DDoS Detection Based on Data Mining Techniques., , and . WISTP, volume 8501 of Lecture Notes in Computer Science, page 190-199. Springer, (2014)Mapping rules for converting from ODL to XML schemas., , , , , and . iiWAS, page 307-316. ACM, (2010)Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series., , and . ICEIS (1), page 346-352. SciTePress, (2015)