Author of the publication

Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS).

, , , , , , and . J. Assoc. Inf. Sci. Technol., 61 (2): 405-418 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximate model for the action potential of the heart: application to atrial fibrillation diagnosis., and . IJCIH, 1 (3): 229-239 (2012)Numerical methods for calculating the fuzzy integral., , and . Fuzzy Sets Syst., 83 (1): 57-62 (1996)A new approach for defuzzification., , and . Fuzzy Sets Syst., 111 (3): 351-356 (2000)Correction to Ä new approach for defuzzification" Fuzzy Sets and Systems 111 (2000) 351-356., , and . Fuzzy Sets Syst., 128 (1): 133-134 (2002)Comments on "The peano theorem for fuzzy differential equations revisited"., , and . Fuzzy Sets Syst., 98 (1): 149 (1998)On Fuzzy Integral Equations., , and . Fundam. Informaticae, 37 (1-2): 89-99 (1999)On the Theory of Typicality., , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., 3 (2): 127-142 (1995)Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities., , and . Fighting Terror in Cyberspace, volume 65 of Series in Machine Perception and Artificial Intelligence, WorldScientific, (2005)Anomaly detection in web documents using crisp and fuzzy-based cosine clustering methodology., , , and . Inf. Sci., 177 (2): 467-475 (2007)Numerical solutions of fuzzy differential and integral equations., , and . Fuzzy Sets Syst., 106 (1): 35-48 (1999)