Author of the publication

Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity.

, , , , and . WISI, volume 3917 of Lecture Notes in Computer Science, page 4-15. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

US Domestic Extremist Groups on the Web: Link and Content Analysis., , , , and . IEEE Intelligent Systems, 20 (5): 44-51 (2005)CMedPort: Intelligent Searching for Chinese Medical Information., , and . ICADL, volume 2911 of Lecture Notes in Computer Science, page 34-45. Springer, (2003)A Framework for Privacy-Preserving Medical Document Sharing., and . ICIS, Association for Information Systems, (2013)Evaluating the use of search engine development tools in IT education., , , , and . J. Assoc. Inf. Sci. Technol., 61 (2): 288-299 (2010)Building domain-specific web collections for scientific digital libraries: a meta-search enhanced focused crawling method., , and . JCDL, page 135-141. ACM, (2004)NanoPort: An Example for Building Knowledge Portals for Scientific Domains., , , , , , , , , and . JCDL, page 387. IEEE Computer Society, (2003)The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web., , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 623-624. Springer, (2005)SpidersRUs: Creating specialized search engines in multiple languages., , , , and . Decis. Support Syst., 45 (3): 621-640 (2008)On the Topology of the Dark Web of Terrorist Groups., , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 367-376. Springer, (2006)Collection of U.S. Extremist Online Forums: A Web Mining Approach., , , and . HICSS, page 70. IEEE Computer Society, (2007)