Author of the publication

Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.

, , , , and . ISI, page 1-6. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dark Web - Exploring and Data Mining the Dark Side of the Web. Springer, (2012)Semantic indexing and searching using a Hopfield net., , and . J. Inf. Sci., 24 (1): 3-18 (1998)Senior Scholars' Forum., , , , , and . ICIS, Association for Information Systems, (2011)Mapping Dark Web Geolocation., and . EuroISI, volume 5376 of Lecture Notes in Computer Science, page 97-107. Springer, (2008)Homeland Security Data Mining Using Social Network Analysis.. EuroISI, volume 5376 of Lecture Notes in Computer Science, page 4. Springer, (2008)A Spatio Temporal Visualizer for Law Enforcement., , , , , , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 181-194. Springer, (2003)A Lexicon-Enhanced Method for Sentiment Classification: An Experiment on Online Product Reviews., , and . IEEE Intelligent Systems, 25 (4): 46-53 (2010)An integrated approach to mapping worldwide bioterrorism research capabilities., , , , and . ISI, page 212-214. IEEE, (2008)Modeling knowledge diffusion in scientific innovation networks: an institutional comparison between China and US with illustration for nanotechnology., , , , and . Scientometrics, 105 (3): 1953-1984 (2015)Digital Libraries: Technological Advances and Social Impacts (Guest Editors' Introduction)., and . Computer, 32 (2): 45-50 (1999)