Title: The Android Malware Handbook: Detection and Analysis by Human and Machine, Author: Qian Han
Title: Handbook of Computational Approaches to Counterterrorism, Author: V.S. Subrahmanian
Title: A Machine Learning Based Model of Boko Haram, Author: V. S. Subrahmanian
Title: The Global Cyber-Vulnerability Report, Author: V.S. Subrahmanian
Title: Indian Mujahideen: Computational Analysis and Public Policy, Author: V.S. Subrahmanian
Title: Computational Analysis of Terrorist Groups: Lashkar-e-Taiba, Author: V.S. Subrahmanian
Title: A Machine Learning Based Model of Boko Haram, Author: V. S. Subrahmanian
Title: Multimedia Information Systems, Author: V.S. Subrahmanian
Title: Multimedia Database Systems: Issues and Research Directions, Author: V.S. Subrahmanian
Title: Computational Analysis of Terrorist Groups: Lashkar-e-Taiba, Author: V.S. Subrahmanian
Title: Detecting Trust and Deception in Group Interaction, Author: V. S. Subrahmanian
Title: Detecting Trust and Deception in Group Interaction, Author: V. S. Subrahmanian
Title: The Android Malware Handbook: Detection and Analysis by Human and Machine, Author: Qian Han
Title: Geospatial Abduction: Principles and Practice, Author: Paulo Shakarian
Title: Detecting Trust and Deception in Group Interaction, Author: V. S. Subrahmanian
Title: A Machine Learning Based Model of Boko Haram, Author: V. S. Subrahmanian
Title: Multimedia Information Systems, Author: V.S. Subrahmanian
Title: Computational Analysis of Terrorist Groups: Lashkar-e-Taiba, Author: V.S. Subrahmanian
Title: The Global Cyber-Vulnerability Report, Author: V.S. Subrahmanian
Title: Geospatial Abduction: Principles and Practice, Author: Paulo Shakarian

Pagination Links