Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using the impact matrix for predictive situational awareness., , , , and . FUSION, page 1-7. IEEE, (2007)Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards., , , , and . ASONAM, page 850-857. IEEE Computer Society, (2012)Semantic Data Management: Sensor-Based Port Security Use Case., , , , and . EISIC, page 155-158. IEEE, (2013)Information acquisition strategies for Bayesian network-based decision support., and . FUSION, page 1-8. IEEE, (2010)The HiTS/ISAC Social Network Analysis Tool., , , and . EISIC, page 291-296. IEEE Computer Society, (2012)Analysis of Weak Signals for Detecting Lone Wolf Terrorists., , , , , and . EISIC, page 197-204. IEEE Computer Society, (2012)Harvesting and analysis of weak signals for detecting lone wolf terrorists., , , , , and . Secur. Informatics, 2 (1): 11 (2013)An Ontology-based Adaptive Reporting Tool., , and . STIDS, volume 808 of CEUR Workshop Proceedings, page 85-88. CEUR-WS.org, (2011)Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime., , , , , , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 171-182. Springer, (2008)A social network analysis of the information fusion community., , and . FUSION, page 1-8. IEEE, (2011)