Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid focused crawling on the Surface and the Dark Web., , , , and . EURASIP J. Information Security, (2017)V4Design for Enhancing Architecture and Video Game Creation., , , , , , , , , and 9 other author(s). ISMAR Adjunct, page 305-309. IEEE, (2018)Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes., , , , , , , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 221-233. Springer, (2016)People and Vehicles in Danger - A Fire and Flood Detection System in Social Media., , , , and . IVMSP, page 1-5. IEEE, (2018)PatMedia: Augmenting Patent Search with Content-Based Image Retrieval., , , and . IRFC, volume 7356 of Lecture Notes in Computer Science, page 109-112. Springer, (2012)Discovery of Environmental Nodes in the Web., , , , and . IRFC, volume 7356 of Lecture Notes in Computer Science, page 58-72. Springer, (2012)Towards a framework for detecting advanced Web bots., , , , , and . ARES, page 18:1-18:10. ACM, (2019)Personalized Environmental Service Configuration and Delivery Orchestration: The PESCaDO Demonstrator., , , , , , , , , and 11 other author(s). ESWC (Satellite Events), volume 7540 of Lecture Notes in Computer Science, page 435-440. Springer, (2012)The sensor to decision chain in crisis management., , , , , , , , and . ISCRAM, ISCRAM Association, (2018)Detection of Terrorism-related Twitter Communities using Centrality Scores., , , , , and . MFSec@ICMR, page 21-25. ACM, (2017)