Author of the publication

Co-offending Network Mining.

, , , , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Co-offending Network Mining., , , , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)Comparing SVD and word2vec for analysis of malware forum posts., , and . ASONAM, page 1080-1086. ACM, (2017)Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums., , , and . ISI, page 136-141. IEEE, (2018)Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler., and . ASONAM, page 1024-1027. ACM, (2015)Networking in Child Exploitation: Assessing disruption strategies using registrant information., , , , and . ASONAM, page 400-407. ACM, (2015)Understanding the link between social and spatial distance in the crime world., , and . SIGSPATIAL/GIS, page 550-553. ACM, (2012)Location, Location, Location: Mapping Potential Canadian Targets in Online Hacker Discussion Forums., , and . EISIC, page 16-23. IEEE Computer Society, (2016)Oracle Rdb's Record Caching Model., , and . SIGMOD Conference, page 526-527. ACM Press, (1998)Exploring the structural characteristics of social networks in a large criminal court database., , and . ISI, page 209-214. IEEE, (2013)Uncovering Tor: An Examination of the Network Structure., , , and . Security and Communication Networks, (2018)