Author of the publication

Comparing Two Models for Terrorist Group Detection: GDM or OGDM?.

, , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 149-160. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A real time data warehouse approach for data processing., , , and . SIU, page 1-4. IEEE, (2013)Improved Naïve Bayesian algorithm for author detection., , , and . SIU, page 1-4. IEEE, (2013)Prediction of past unsolved terrorist attacks., , and . ISI, page 37-42. IEEE, (2009)Reducing the Effect of Out-Voting Problem in Ensemble Based Incremental Support Vector Machines., , , and . ICANN (2), volume 3697 of Lecture Notes in Computer Science, page 607-612. Springer, (2005)Comparing Two Models for Terrorist Group Detection: GDM or OGDM?., , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 149-160. Springer, (2008)Classification of Volatile Organic Compounds with Incremental SVMs and RBF Networks., , , and . ISCIS, volume 3733 of Lecture Notes in Computer Science, page 322-331. Springer, (2005)Understanding Crime Networks: Actors and Links., and . SocInfo Workshops, volume 8852 of Lecture Notes in Computer Science, page 78-86. Springer, (2014)Resilience of Criminal Networks., and . SBP, volume 9021 of Lecture Notes in Computer Science, page 400-404. Springer, (2015)Deciding Resilient Criminal Networks., and . ASONAM, page 1368-1372. ACM, (2015)How Much Similar Are Terrorists Networks of Istanbul?, , and . ASONAM, page 468-472. IEEE Computer Society, (2011)