Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concept Detection in Multimedia Web Resources About Home Made Explosives., , , , , , , and . ARES, page 632-641. IEEE Computer Society, (2015)Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web., , , , and . ARES, page 229-234. IEEE Computer Society, (2016)Key Player Identification in Terrorism-Related Social Media Networks Using Centrality Measures., , , , and . EISIC, page 112-115. IEEE Computer Society, (2016)Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes., , , , , , , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 221-233. Springer, (2016)Hybrid focused crawling on the Surface and the Dark Web., , , , and . EURASIP J. Information Security, (2017)Detection of Terrorism-related Twitter Communities using Centrality Scores., , , , , and . MFSec@ICMR, page 21-25. ACM, (2017)An Enhanced Cyber Attack Attribution Framework., , , , , and . TrustBus, volume 11033 of Lecture Notes in Computer Science, page 213-228. Springer, (2018)An Extensible Framework for Interactive Real-Time Visualizations of Large-Scale Heterogeneous Multimedia Information from Online Sources., , , , , and . MMM (2), volume 11962 of Lecture Notes in Computer Science, page 424-435. Springer, (2020)A Framework for the Discovery, Analysis, and Retrieval of Multimedia Homemade Explosives Information on the Web., , , , , , , and . ARES, page 601-610. IEEE Computer Society, (2015)Identifying Terrorism-Related Key Actors in Multidimensional Social Networks., , , and . MMM (2), volume 11296 of Lecture Notes in Computer Science, page 93-105. Springer, (2019)