Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Affect Intensity Analysis of Dark Web Forums., and . ISI, page 282-288. IEEE, (2007)Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement., , and . ISI, page 7-12. IEEE, (2008)Expert Prediction, Symbolic Learning, and Neural Networks: An Experiment on Greyhound Racing., , , , , and . IEEE Expert, 9 (6): 21-27 (1994)Automatic Concept Classification of Text from Electronic Meetings, , , , and . Commun. ACM, 37 (10): 56--73 (1994)Identifying top listers in Alphabay using Latent Dirichlet Allocation., , , , and . ISI, page 219. IEEE, (2016)SCADA honeypots: An in-depth analysis of Conpot., , and . ISI, page 196-198. IEEE, (2016)Anonymous port scanning: Performing network reconnaissance through Tor., , and . ISI, page 217. IEEE, (2016)An integrated approach to mapping worldwide bioterrorism research capabilities., , , , and . ISI, page 212-214. IEEE, (2008)A Lexicon-Enhanced Method for Sentiment Classification: An Experiment on Online Product Reviews., , and . IEEE Intelligent Systems, 25 (4): 46-53 (2010)Disease named entity recognition using semisupervised learning and conditional random fields., , and . J. Assoc. Inf. Sci. Technol., 62 (4): 727-737 (2011)