Author of the publication

Semantic Web Technologies for Terrorist Network Analysis.

, , and . Emergent Information Technologies and Enabling Policies for Counter-Terrorism, Wiley-IEEE Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reshaping terrorist networks., , and . Commun. ACM, 57 (8): 60-69 (2014)Semantic Web Technologies for Terrorist Network Analysis., , and . Emergent Information Technologies and Enabling Policies for Counter-Terrorism, Wiley-IEEE Press, (2006)STONE: shaping terrorist organizational network efficiency., , and . ASONAM, page 348-355. ACM, (2013)Indian Mujahideen - Computational Analysis and Public Policy., , , and . Terrorism, Security, and Computation Springer, (2013)Dealing with Lashkar-e-Taiba: A Multi-player Game-Theoretic Perspective., , and . EISIC, page 354-359. IEEE Computer Soecity, (2011)Using Trust and Provenance for Content Filtering on the Semantic Web., and . MTW, volume 190 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu and Kashmir., , , and . EISIC, page 224-229. IEEE Computer Soecity, (2011)Cultural Modeling in a Game Theoretic Framework., , , , and . AAAI Fall Symposium: Adaptive Agents in Cultural Contexts, volume FS-08-01 of AAAI Technical Report, page 43. AAAI, (2008)