Author of the publication

Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS).

, , , , , , and . J. Assoc. Inf. Sci. Technol., 61 (2): 405-418 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New concepts for cluster construction and similarity measurement., , and . Int. J. Intell. Syst., 36 (5): 2267-2291 (2021)Comparison of Methods for Computing Similarity Based on Clusters -Utilizing Different Membership Functions., , and . Trans. Mach. Learn. Data Min., 14 (1): 31-44 (2021)Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities., , and . Fighting Terror in Cyberspace, volume 65 of Series in Machine Perception and Artificial Intelligence, WorldScientific, (2005)Relative influences and the reliability of weights in fuzzy cognitive maps., , , and . Fuzzy Sets Syst., (2022)Design issues in fuzzy case-based reasoning., and . Fuzzy Sets Syst., 117 (2): 251-267 (2001)Fuzzy multicriteria selection of alternatives: The worst-case method., , , and . Int. J. Intell. Syst., 25 (9): 948-957 (2010)A new approach for fuzzy clustering of Web documents., , , , and . FUZZ-IEEE, page 377-381. IEEE, (2004)Synthesis of adaptive linear-time-invariant controllers by fuzzy logic controllers., and . Fuzzy Sets Syst., 106 (1): 75-83 (1999)Feature-based fuzzy classification for interpretation of mammograms., , and . Fuzzy Sets Syst., 114 (2): 271-280 (2000)Expert Systems for Economic/Business Forecasting., , and . SAC, page 511-516. ACM, (1993)