Author of the publication

Information Integration for Terrorist or Criminal Social Networks.

, and . Security Informatics, volume 9 of Annals of Information Systems, Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Online Consumer Review Opinions with Sentiment Analysis using Machine Learning., , , and . Pac. Asia J. Assoc. Inf. Syst., 2 (3): 7 (2010)Social networks integration and privacy preservation using subgraph generalization., and . KDD Workshop on CyberSecurity and Intelligence Informatics, page 53-61. ACM, (2009)Identifing influential users in an online healthcare social network., and . ISI, page 43-48. IEEE, (2010)A Study of Social Interactions in Online Health Communities., , , and . SocialCom/PASSAT, page 774-779. IEEE Computer Society, (2011)Terrorist and criminal social network data sharing and integration., and . ISI, page 230. IEEE, (2009)Identifying Dark Web clusters with temporal coherence analysis., , and . ISI, page 167-172. IEEE, (2011)Estimating User Influence in the MedHelp Social Network., and . IEEE Intelligent Systems, 27 (5): 44-50 (2012)A Trend Analysis of Domain-Specific Literatures with Content and Co-author Network Similarity., , , and . ICADL, volume 7634 of Lecture Notes in Computer Science, page 73-76. Springer, (2012)Generalizing terrorist social networks with K-nearest neighbor and edge betweeness for social network integration and privacy preservation., and . ISI, page 49-54. IEEE, (2010)An Exploratory Study of Enhancing Text Clustering with Auto-Generated Semantic Tags., and . SKG, page 104-111. IEEE Computer Society, (2012)