From post

Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism.

, , , , , , , и . ISI, том 3073 из Lecture Notes in Computer Science, стр. 125-145. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

US Domestic Extremist Groups on the Web: Link and Content Analysis., , , , и . IEEE Intelligent Systems, 20 (5): 44-51 (2005)Mapping the contemporary terrorism research domain., и . Int. J. Hum. Comput. Stud., 65 (1): 42-56 (2007)Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity., , , , и . WISI, том 3917 из Lecture Notes in Computer Science, стр. 4-15. Springer, (2006)Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism., , , , , , , и . ISI, том 3073 из Lecture Notes in Computer Science, стр. 125-145. Springer, (2004)Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity., , , , и . Int. J. Hum. Comput. Stud., 65 (1): 71-84 (2007)Introduction to special issue on terrorism informatics., , , и . Inf. Syst. Frontiers, 13 (1): 1-3 (2011)Business stakeholder analyzer: An experiment of classifying stakeholders on the Web., , и . J. Assoc. Inf. Sci. Technol., 60 (1): 59-74 (2009)Uncovering the dark Web: A case study of Jihad on the Web., , , , , и . J. Assoc. Inf. Sci. Technol., 59 (8): 1347-1359 (2008)The use of the Internet for business: the experience of early adopters in Singapore., , , , и . Internet Res., 7 (3): 217-228 (1997)Web-based data collection for the analysis of hidden relationships (Web mining of hypertext links).. ICIS, стр. 739-740. Association for Information Systems, (2000)