Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)., , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2149-2150 (2022)Knowledge mapping for rapidly evolving domains: A design science approach, , , , and . Decision Support Systems, 50 (2): 415-427 (2011)Automatic Concept Classification of Text from Electronic Meetings, , , , and . Commun. ACM, 37 (10): 56--73 (1994)Affect Intensity Analysis of Dark Web Forums., and . ISI, page 282-288. IEEE, (2007)Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement., , and . ISI, page 7-12. IEEE, (2008)Expert Prediction, Symbolic Learning, and Neural Networks: An Experiment on Greyhound Racing., , , , , and . IEEE Expert, 9 (6): 21-27 (1994)Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism., , , , , , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 125-145. Springer, (2004)Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web., , , , , , , , and . ISI, page 1-6. IEEE, (2020)Evaluating an integrated forum portal for terrorist surveillance and analysis., , , , and . ISI, page 168-170. IEEE, (2012)Scalable sentiment classification across multiple Dark Web Forums., and . ISI, page 78-83. IEEE, (2012)