Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms., , and . PAISI, volume 5477 of Lecture Notes in Computer Science, page 25-30. Springer, (2009)Specific Similarity Measure for Terrorist Networks: How Much Similar Are Terrorist Networks of Turkey?, , , and . PAISI, volume 6749 of Lecture Notes in Computer Science, page 15-26. Springer, (2011)Detecting criminal networks: SNA models are compared to proprietary models., , , and . ISI, page 156-158. IEEE, (2012)Linking and Organising Information in Law Enforcement Investigations., , and . IV, page 443-449. IEEE Computer Society, (2009)Resilience of Criminal Networks., and . SBP, volume 9021 of Lecture Notes in Computer Science, page 400-404. Springer, (2015)Deciding Resilient Criminal Networks., and . ASONAM, page 1368-1372. ACM, (2015)Understanding Crime Networks: Actors and Links., and . SocInfo Workshops, volume 8852 of Lecture Notes in Computer Science, page 78-86. Springer, (2014)Theft Gang Discovery Using Co-offending Knowledge and SNA., , and . IV, page 347-348. IEEE Computer Society, (2008)How Much Similar Are Terrorists Networks of Istanbul?, , and . ASONAM, page 468-472. IEEE Computer Society, (2011)Comparison of Feature-Based Criminal Network Detection Models with k-Core and n-Clique., , , and . ASONAM, page 400-401. IEEE Computer Society, (2010)