Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Textual Analysis of Stock Market Prediction Using Financial News Articles., and . AMCIS, page 185. Association for Information Systems, (2006)Extracting Meaningful Entities from Police Narrative Reports., , and . DG.O, Digital Government Research Center, (2002)The Arizona IDMatcher: developing an identity matching tool for law enforcement., , , , , , and . DG.O, volume 228 of ACM International Conference Proceeding Series, page 304-305. Digital Government Research Center, (2007)Examining User Acceptance of COPLINK Technologies by Law Enforcement Officers: A Survey Study., , , and . DG.O, Digital Government Research Center, (2002)BioPortal: Sharing, Analyzing & Visualizing Infectious Disease Datasets., , , , , , , and . DG.O, Digital Government Research Center, (2004)Examining Agencies' Satisfaction with Electronic Record Management Systems in e-Government: A Large-Scale Survey Study., , , and . WEB, volume 22 of Lecture Notes in Business Information Processing, page 25-36. Springer, (2008)Intelligence and security informatics for homeland security: information, communication, and transportation., , and . IEEE Trans. Intelligent Transportation Systems, 5 (4): 329-341 (2004)Identifying top listers in Alphabay using Latent Dirichlet Allocation., , , , and . ISI, page 219. IEEE, (2016)SCADA honeypots: An in-depth analysis of Conpot., , and . ISI, page 196-198. IEEE, (2016)Anonymous port scanning: Performing network reconnaissance through Tor., , and . ISI, page 217. IEEE, (2016)