Author of the publication

Understanding the Nexus of Terrorist Web Sites.

, and . Intelligence and Security Informatics, volume 135 of Studies in Computational Intelligence, Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks., and . Decis. Support Syst., 38 (3): 473-487 (2004)Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism., , , , , , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 125-145. Springer, (2004)Understanding the Nexus of Terrorist Web Sites., and . Intelligence and Security Informatics, volume 135 of Studies in Computational Intelligence, Springer, (2008)Untangling Criminal Networks: A Case Study., and . ISI, volume 2665 of Lecture Notes in Computer Science, page 232-248. Springer, (2003)Extracting Meaningful Entities from Police Narrative Reports., , and . DG.O, Digital Government Research Center, (2002)Word of Mouth Marketing through Online Social Networks., , , and . AMCIS, page 291. Association for Information Systems, (2009)Mining Communities of Bloggers: A Case Study on Cyber-Hate., and . ICIS, page 11. Association for Information Systems, (2006)The Effects of Lender-Borrower Communication on P2P Lending Outcomes., , and . ICIS, Association for Information Systems, (2015)Identifying features for detecting fraudulent loan requests on P2P platforms., , and . ISI, page 79-84. IEEE, (2016)CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis., , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 168-180. Springer, (2003)