|
Principles of Multimedia Database Systems (The Morgan Kaufmann Series in Data Management Systems)
by
4.03 avg rating — 36 ratings
—
published
1998
—
3 editions
|
|
|
The Android Malware Handbook: Detection and Analysis by Human and Machine
by
|
|
|
Indian Mujahideen: Computational Analysis and Public Policy
by
3.62 avg rating — 8 ratings
—
published
2013
—
6 editions
|
|
|
Multimedia Database Systems: Issues and Research Directions
by
really liked it 4.00 avg rating — 6 ratings
—
published
1995
—
2 editions
|
|
|
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
by
2.62 avg rating — 8 ratings
—
published
2012
—
8 editions
|
|
|
Heterogeneous Agent Systems
by
2.71 avg rating — 7 ratings
—
published
2000
—
2 editions
|
|
|
Multimedia Information Systems
by
liked it 3.00 avg rating — 6 ratings
—
published
1998
—
5 editions
|
|
|
Advanced Database Systems (The Morgan Kaufmann Series in Data Management Systems)
by
liked it 3.00 avg rating — 6 ratings
—
published
1997
—
2 editions
|
|
|
The Global Cyber-Vulnerability Report
by
3.67 avg rating — 3 ratings
—
published
2015
—
5 editions
|
|
|
Handbook of Computational Approaches to Counterterrorism
by
2.67 avg rating — 3 ratings
—
published
2012
—
6 editions
|
|
|
Geospatial Abduction: Principles and Practice
by
really liked it 4.00 avg rating — 2 ratings
—
published
2011
—
4 editions
|
|
|
Cyber Warfare: Building the Scientific Foundation (Advances in Information Security Book 56)
by
it was amazing 5.00 avg rating — 1 rating
—
published
2015
—
6 editions
|
|
|
Moving Target Defense II: Application of Game Theory and Adversarial Modeling (Advances in Information Security Book 100)
by
it was amazing 5.00 avg rating — 1 rating
—
published
2012
|
|
|
A Machine Learning Based Model of Boko Haram
by
really liked it 4.00 avg rating — 1 rating
|
|
|
Lashkar E Taiba Computational Analysis (Hb 2017)
by
really liked it 4.00 avg rating — 1 rating
|
|
|
Indian Mujahideen: Computational Analysis and Public Policy
by
really liked it 4.00 avg rating — 1 rating
|
|
|
Scalable Uncertainty Management: 7th International Conference, SUM 2013, Washington, DC, USA, September 16-18, 2013, Proceedings (Lecture Notes in Artificial Intelligence)
by
really liked it 4.00 avg rating — 1 rating
—
published
2013
—
3 editions
|
|
|
Search Theory: A Game Theoretic Perspective
by
really liked it 4.00 avg rating — 1 rating
—
published
2013
—
8 editions
|
|
|
A Machine Learning Based Model of Boko Haram
by
|
|
|
Scalable Uncertainty Management: First International Conference, SUM 2007, Washington, DC, USA, October 10-12, 2007, Proceedings (Lecture Notes in Computer Science, 4772)
by
0.00 avg rating — 0 ratings
—
published
2007
—
4 editions
|
|
|
Handbook of Computational Approaches to Counterterrorism [Special Indian Edition - Reprint Year: 2020]
by
0.00 avg rating — 0 ratings
|
|
|
The Global Cyber-Vulnerability Report
by
0.00 avg rating — 0 ratings
|
|
|
Machine Learning Techniques to Predict Terrorist Attacks: Exemplified by Jama'at Nasr al-Islam wal Muslimin
by
0.00 avg rating — 0 ratings
|
|
|
Moving Target Defense II: Application of Game Theory and Adversarial Modeling (Advances in Information Security Book 100)
by
0.00 avg rating — 0 ratings
|
|
|
Adaptive Autonomous Secure Cyber Systems
by
|
|
|
Cyber Deception: Building the Scientific Foundation
by
|
|
|
Cyber Warfare: Building the Scientific Foundation (Advances in Information Security Book 56)
by
0.00 avg rating — 0 ratings
|
|
|
A General Framework for Reasoning On Inconsistency
by
0.00 avg rating — 0 ratings
—
published
2013
—
5 editions
|
|
|
Data-driven Generation of Policies
by
0.00 avg rating — 0 ratings
—
published
2014
—
6 editions
|
|
|
Moving Target Defense II: Application of Game Theory and Adversarial Modeling (Advances in Information Security, 100)
by
0.00 avg rating — 0 ratings
—
published
2012
—
5 editions
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.