Author of the publication

Identifying the socio-spatial dynamics of terrorist attacks in the Middle East.

, , , and . ISI, page 175-180. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Network Based Anomaly Detection of Organizational Behavior using Temporal Pattern Mining., , , and . ASONAM, page 1112-1119. ACM, (2017)Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization., , , and . EISIC, page 185. IEEE Computer Society, (2015)Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations., , , and . ISI, page 37-42. IEEE, (2017)A reduction model on multiplex terrorist network., , , and . ISCID, page 272-277. IEEE, (2021)Sentiment Analysis for Topics based on Interaction Chain Model., , , and . EISIC, page 133-136. IEEE Computer Society, (2015)A Simulation model on the propagation of terrorist ideology in social community., , , and . ACAI, page 45:1-45:8. ACM, (2021)A robust evaluation of terrorist network based on node-lap degree of triads., , , , and . ISI, page 194. IEEE, (2012)Social Network Construction and Analysis Based on Community Photo Collections with Face Recognition., , , and . BIFE, page 463-467. IEEE Computer Society, (2013)The "six-element" analysis method for the research on the characteristics of terrorist activities., , , , and . Ann. Oper. Res., 234 (1): 17-35 (2015)Modeling Multiple Locations Defence and Attack Dynamic Bayesian Decision Game., , , and . BIFE, page 449-453. IEEE Computer Society, (2013)