• 17202 Citations
  • 66 h-Index
1989 …2019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1989 2019

Filter
Chapter
Chapter

Conducting large-scale analyses of underground hacker communities

Benjamin, V., Samtani, S. & Chen, H., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 56-75 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

hacker
community
1 Citation (Scopus)

Exploring gray web forums: Analysis and investigation of forum-based communities in Taiwan

Wang, J. H., Fu, T., Lin, H. M. & Chen, H., 2008, Studies in Computational Intelligence. Vol. 135. p. 121-134 14 p. (Studies in Computational Intelligence; vol. 135).

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
Observability
Law enforcement
Experiments
45 Citations (Scopus)

Filling preposition-based templates to capture information from medical abstracts.

Leroy, G. A. & Chen, H., 2002, Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing. p. 350-361 12 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Research Personnel
Explosions
Proteins

Identification of Marker Genes from High-Dimensional Microarray Data for Cancer Classification

Li, J., Su, H. & Chen, H., May 23 2007, Knowledge Discovery in Bioinformatics: Techniques, Methods, and Applications. John Wiley & Sons, Inc., p. 71-87 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Microarrays
Genes
3 Citations (Scopus)

Knowledge sharing and diffusion patterns

Dang, Y., Chen, H., Zhang, Y. & Roco, M. C., 2009, IEEE Nanotechnology Magazine. 3 ed. Vol. 3. p. 16-21 6 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Nanotechnology
Trademarks
Developing countries
Innovation
10 Citations (Scopus)

Nanotechnology public funding and impact analysis: A tale of two decades (1991-2010)

Chen, H., Roco, M. C. & Son, J., 2013, IEEE Nanotechnology Magazine. 1 ed. Vol. 7. p. 9-14 6 p. 6450164

Research output: Chapter in Book/Report/Conference proceedingChapter

Nanotechnology
Patents and inventions
Industry
Innovation
Economics
1 Citation (Scopus)

Revealing the Hidden World of the Dark Web: Social Media Forums and Videos11

Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., 2013, Intelligent Systems for Security Informatics. Elsevier Inc., p. 1-28 28 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Suspect vehicle identification for border safety

Kaza, S. & Chen, H., 2008, Studies in Computational Intelligence. Vol. 135. p. 305-318 14 p. (Studies in Computational Intelligence; vol. 135).

Research output: Chapter in Book/Report/Conference proceedingChapter

National security
Statistical tests
Law enforcement
Inspection

Understanding the nexus of terrorist web sites

Xu, J. & Chen, H., 2008, Studies in Computational Intelligence. Vol. 135. p. 65-78 14 p. (Studies in Computational Intelligence; vol. 135).

Research output: Chapter in Book/Report/Conference proceedingChapter

Websites
Electric network analysis
World Wide Web