Author of the publication

Homeland Security Data Mining Using Social Network Analysis.

. EuroISI, volume 5376 of Lecture Notes in Computer Science, page 4. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Concept Classification of Text from Electronic Meetings, , , , and . Commun. ACM, 37 (10): 56--73 (1994)Introduction to the JASIST Special Topic issue on web retrieval and mining: A machine learning perspective.. J. Assoc. Inf. Sci. Technol., 54 (7): 621-624 (2003)Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)., , and . ACM Trans. Priv. Secur., 23 (4): 21:1-21:33 (2020)Affect Intensity Analysis of Dark Web Forums., and . ISI, page 282-288. IEEE, (2007)Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement., , and . ISI, page 7-12. IEEE, (2008)Expert Prediction, Symbolic Learning, and Neural Networks: An Experiment on Greyhound Racing., , , , , and . IEEE Expert, 9 (6): 21-27 (1994)A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study., , and . J. Comput. Mediat. Commun., 16 (1): 48-70 (2010)An integrated framework for analyzing multilingual content in Web 2.0 social media., , , , , , and . Decis. Support Syst., (2014)Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks., and . Decis. Support Syst., 38 (3): 473-487 (2004)Knowledge mapping for rapidly evolving domains: A design science approach., , , , and . Decis. Support Syst., 50 (2): 415-427 (2011)