Author of the publication

A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities in Social Media Networks.

, , , , , , and . EISIC, page 166. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive hierarchical density histogram for complex binary image retrieval., , and . CBMI, page 1-6. IEEE, (2010)Hybrid focused crawling on the Surface and the Dark Web., , , , and . EURASIP J. Inf. Secur., (2017)A Context-Aware Conversational Agent in the Rehabilitation Domain., , , , , , , , , and 1 other author(s). Future Internet, 11 (11): 231 (2019)EUCISE-OWL: An ontology-based representation of the Common Information Sharing Environment (CISE) for the maritime domain., , , , , and . Semantic Web, 12 (4): 603-615 (2021)Assessing Virtual Reality Spaces for Elders Using Image-Based Sentiment Analysis and Stress Level Detection., , , , , , , , and . Sensors, 23 (8): 4130 (2023)Interactive video retrieval evaluation at a distance: comparing sixteen interactive video search systems in a remote setting at the 10th Video Browser Showdown., , , , , , , , , and 9 other author(s). Int. J. Multim. Inf. Retr., 11 (1): 1-18 (2022)Mobile App Interventions for Parkinson's Disease, Multiple Sclerosis and Stroke: A Systematic Literature Review., , , , , , , , , and 12 other author(s). Sensors, 23 (7): 3396 (April 2023)Named Entity Recognition in Cyber Threat Intelligence Using Transformer-based Models., , , , , , and . CSR, page 348-353. IEEE, (2021)Forecasting Cyber-Attacks to Destination Ports Using Machine Learning., , , , , and . ICISSP, page 757-764. SciTePress, (2023)A survey for image based methods in construction: from images to digital twins., , , , , and . CBMI, page 103-110. ACM, (2022)