• 18422 Citations
  • 66 h-Index
1989 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
Conference contribution

A computational approach to detecting and assessing sustainability-related communities in social media

Jiang, S. & Chen, H., Dec 1 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 48-58 11 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

A control study on the effects of HRV biofeedback therapy in patients with post-stroke depression

Li, X., Zhang, T., Song, L., Zhang, Y., Xing, C. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 213-224 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Affect intensity analysis of dark web forums

Abbasi, A. & Chen, H., Oct 1 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 282-288 7 p. 4258712. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

57 Scopus citations

A framework for exploring Gray Web Forums: Analysis of forum-based communities in Taiwan

Wang, J. H., Fu, T., Lin, H. M. & Chen, H., Jan 1 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 498-503 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

A framework for stylometric similarity detection in online settings

Abbasi, A. & Chen, H., Dec 1 2007, Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. p. 1442-1451 10 p. (Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Algorithmic approach to building concept space for a scientific community

Chen, H., Jan 1 1994, Proceedings of the Hawaii International Conference on System Sciences. Nunamaker, J. F. & Sprague, R. H. J. (eds.). Publ by IEEE, p. 201-210 10 p. (Proceedings of the Hawaii International Conference on System Sciences; vol. 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

A multi-layer Naïve Bayes model for approximate identity matching

Wang, G. A., Chen, H. & Atabakhsh, H., Jan 1 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 479-484 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Analyzing and visualizing gray Web forum structure

Yang, C. C., Ng, T. D., Wang, J. H., Wei, C. P. & Chen, H., Jan 1 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer-Verlag, p. 21-33 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

An event-driven SIR model for topic diffusion in web forums

Woo, J. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Anonymous port scanning: Performing network reconnaissance through Tor

Rohrmann, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 217 1 p. 7745475

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

An SIR model for violent topic diffusion in social media

Woo, J., Son, J. & Chen, H., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

A review of public health syndromic surveillance systems

Yan, P., Zeng, D. & Chen, H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 249-260 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Assessing medical device vulnerabilities on the Internet of Things

McMahon, E., Williams, R., El, M., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 176-178 3 p. 8004903

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Automatic patent classification using citation network information: An experimental study in nanotechnology

Li, X., Chen, H., Zhang, Z. & Li, J., Nov 29 2007, Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, JCDL 2007: Building and Sustaining the Digital Environment. p. 419-427 9 p. (Proceedings of the ACM International Conference on Digital Libraries).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Scopus citations

A web-based system for infectious disease data integration and sharing: Evaluating outcome, task performance efficiency, user information satisfaction, and usability

Hu, P. J. H., Zeng, D., Chen, H., Larson, C. A. & Tseng, C., Dec 24 2007, Intelligence and Security Informatics: Biosurveillance - Second NSF Workshop, BioSurveillance 2007, Proceedings. p. 134-146 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums

Liu, X. & Chen, H., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 134-150 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Scopus citations

AZpharm metaalert: A meta-learning framework for pharmacovigilance

Liu, X. & Chen, H., 2017, Smart Health - International Conference, ICSH 2016, Revised Selected Papers. Springer Verlag, Vol. 10219 LNCS. p. 147-154 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis

Samtani, S., Chinn, K., Larson, C. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 19-24 6 p. 7745437

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Benchmarking vulnerability assessment tools for enhanced cyber-physical system (CPS) Resiliency

McMahon, E., Patton, M., Samtani, S. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 8587353

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments

El, M., McMahon, E., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 83-88 6 p. 8004879

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Building a directory for the underdeveloped web: An experiment on the arabic medical web directory

Chung, W. & Chen, H., Dec 1 2007, Asian Digital Libraries: Looking Back 10 Years and Forging New Frontiers - 10th International Conference on Asian Digital Libraries, ICADL 2007, Proceedings. p. 468-477 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4822 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Building knowledge management system for researching terrorist groups on the web

Zhou, Y., Qin, J., Lai, G., Reid, E. & Chen, H., Dec 1 2005, Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. p. 2524-2536 13 p. (Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Building web directories in different languages for decision support: A semi-automatic approach

Chung, W., Lai, G., Bonillas, A., Elhourani, T., Tseng, T. L. B. & Chen, H., Dec 1 2005, Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. p. 467-475 9 p. (Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Business intelligence explorer: A knowledge map framework for discovering business intelligence on the Web

Chung, W., Chen, H. & Nunamaker, J. F., 2003, Proceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003. Institute of Electrical and Electronics Engineers Inc., 1173649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Scopus citations

Categorization and analysis of text in computer mediated communication archives using visualization

Abbasi, A. & Chen, H., Nov 29 2007, Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, JCDL 2007: Building and Sustaining the Digital Environment. p. 11-18 8 p. (Proceedings of the ACM International Conference on Digital Libraries).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Chinese chief complaint classification for syndromic surveillance

Lu, H. M., King, C. C., Wu, T. S., Shih, F. Y., Hsiao, J. Y., Zeng, D. & Chen, H., Jan 1 2007, Intelligence and Security Informatics: Biosurveillance - Second NSF Workshop, BioSurveillance 2007, Proceedings. Springer-Verlag, p. 11-22 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Chinese underground market jargon analysis based on unsupervised learning

Zhao, K., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 97-102 6 p. 7745450. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Chronic disease related entity extraction in online Chinese question and answer services

Zhang, Y., Zhang, Y., Yin, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 55-67 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

CMedPort: A cross-regional Chinese medical portal

Zhou, Y., Qin, J., Chen, H., Huang, Z., Zhang, Y., Chung, W. & Wang, G., 2003, Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. Institute of Electrical and Electronics Engineers Inc., Vol. 2003-January. p. 379 1 p. 1204895

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Collaborative friendship networks in online healthcare communities: An exponential random graph model analysis

Song, X., Jiang, S., Yan, X. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 75-87 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Collection of U.S. extremist online forums: A web mining approach

Zhou, Y., Qin, J., Lai, G. & Chen, H., Dec 1 2007, Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07. 4076513. (Proceedings of the Annual Hawaii International Conference on System Sciences).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Comparing the virtual linkage intensity and real world proximity of social movements

Zimbra, D. & Chen, H., Jul 26 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 144-146 3 p. 5484759. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Congestion-aware network-coding-based opportunistic routing in wireless ad hoc networks

Chung, K. C., Chen, H. C. & Liao, W., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6133735. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Content analysis of Jiliadi extremist groups' videos

Salem, A., Reid, E. & Chen, H., Jan 1 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 615-620 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Convergence of knowledge management and e-learning: The GetSmart experience

Marshall, B., Zhang, Y., Chen, H., Lally, A., Shen, R., Fox, E. & Cassel, L. N., 2003, Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. Institute of Electrical and Electronics Engineers Inc., Vol. 2003-January. p. 135-146 12 p. 1204854

Research output: Chapter in Book/Report/Conference proceedingConference contribution

50 Scopus citations

Dark-net ecosystem cyber-threat intelligence (CTI) Tool

Arnold, N., Ebrahimi, M., Zhang, N., Lazarine, B., Patton, M., Chen, H. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 92-97 6 p. 8823501. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dark web forums portal: Searching and analyzing Jihadist forums

Yulei, Z., Shuo, Z., Li, F., Yan, D., Larson, C. A. & Hsinchun, C., Oct 22 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 71-76 6 p. 5137274. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Scopus citations

Deep learning based topic identification and categorization: Mining diabetes-related topics on Chinese health websites

Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9642. p. 481-500 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9642).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Descriptive analytics: Examining expert hackers in web forums

Abbasi, A., Li, W., Benjamin, V., Hu, S. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 56-63 8 p. 6975554. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Scopus citations

Detecting cyber threats in non-english dark net markets: A cross-lingual transfer learning approach

Ebrahimi, M., Surdeanu, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 8587404. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Developing a Dark Web collection and infrastructure for computational and social sciences

Zhang, Y., Zeng, S., Huang, C. N., Fan, L., Yu, X., Dang, Y., Larson, C. A., Denning, D., Roberts, N. & Chen, H., Jul 26 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 59-64 6 p. 5484774. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

Developing understanding of hacker language through the use of lexical semantics

Benjamin, V. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 79-84 6 p. 7165943

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Diabetes-related topic detection in Chinese health websites using deep learning

Chen, X., Zhang, Y., Xing, C., Liu, X. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Diabeticlink: An internationally collaborative cyber-enabled patient empowerment platform

Samtani, G., Maimoon, L., Chuang, J., Nybroe, C., Liu, X., Wiil, U., Li, S. H. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 299-310 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

DiabeticLink: A health big data system for patient empowerment and personalized healthcare

Chen, H., Compton, S. & Hsiao, O., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 71-83 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

DiabeticLink: An integrated and intelligent cyber-enabled health social platform for diabetic patients

Chuang, J., Hsiao, O., Wu, P. L., Chen, J., Liu, X., De La Cruz, H., Li, S. H. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 63-74 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Digital libraries supporting digital government

Marchionini, G., Craig, A., Brandt, L., Klavans, J. & Chen, H., Dec 1 2001, Proceedings of First ACM/IEEE-CS Joint Conference on Digital Libraries. p. 395-397 3 p. (Proceedings of First ACM/IEEE-CS Joint Conference on Digital Libraries).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Digital libraries supporting digital government

Marchionini, G., Craig, A., Brandt, L., Klavans, J. & Chen, H., Jan 1 2001, Proceedings of the 1st ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2001. Association for Computing Machinery, p. 395-397 3 p. (Proceedings of the ACM International Conference on Digital Libraries).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Digital library development in the Asia Pacific

Chen, H., Dec 1 2005, Digital Libraries: Implementing Strategies and Sharing Experiences - 8th International Conference on Asian Digital Libraries, ICADL 2005, Proceedings. p. 509-524 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3815 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Dynamic social network analysis of a dark network: Identifying significant facilitators

Kaza, S., Hu, D. & Chen, H., Oct 1 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 40-46 7 p. 4258671. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations