Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating an integrated forum portal for terrorist surveillance and analysis., , , , and . ISI, page 168-170. IEEE, (2012)Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs., , , , , , , , , and 1 other author(s). ISI, page 70-75. IEEE, (2018)Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions., , , and . ISI, page 148-153. IEEE, (2018)A Spatio Temporal Visualizer for Law Enforcement., , , , , , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 181-194. Springer, (2003)Untangling Criminal Networks: A Case Study., and . ISI, volume 2665 of Lecture Notes in Computer Science, page 232-248. Springer, (2003)Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism., , , , , , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 125-145. Springer, (2004)Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops., , , and . ISI, page 85-90. IEEE, (2015)Semantic indexing and searching using a Hopfield net., , and . J. Inf. Sci., 24 (1): 3-18 (1998)Senior Scholars' Forum., , , , , and . ICIS, Association for Information Systems, (2011)Automatic Concept Classification of Text from Electronic Meetings, , , , and . Commun. ACM, 37 (10): 56--73 (1994)