Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the Nexus of Terrorist Web Sites., and . Intelligence and Security Informatics, volume 135 of Studies in Computational Intelligence, Springer, (2008)Automatically detecting deceptive criminal identities., , and . Commun. ACM, 47 (3): 70-76 (2004)Expert Prediction, Symbolic Learning, and Neural Networks: An Experiment on Greyhound Racing., , , , , and . IEEE Expert, 9 (6): 21-27 (1994)Automatic Concept Classification of Text from Electronic Meetings, , , , and . Commun. ACM, 37 (10): 56--73 (1994)Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums., , and . ACM Trans. Inf. Syst., 26 (3): 12:1-12:34 (2008)Automatic Concept Classification of Text from Electronic Meetings., , , , and . Commun. ACM, 37 (10): 56-73 (1994)Personalized spiders for web search and analysis., , and . JCDL, page 79-87. ACM, (2001)Dark Web - Exploring and Data Mining the Dark Side of the Web. Springer, (2012)Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs., , , , , , , , , and 1 other author(s). ISI, page 70-75. IEEE, (2018)Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions., , , and . ISI, page 148-153. IEEE, (2018)