Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference31 articles.
1. Bowie NG (1968–2009) Terrorism events data: An inventory of databases and data sets. Perspect Terror 11(4):50–72. http://www.rand.org/nsrd/projects/terrorism-incidents.html
2. Chen H (2011) Dark web: Exploring and mining the dark side of the web. In: 2011 European intelligence and security informatics conference, IEEE, pp 1–2. http://www.azsecure-data.org/about.html
3. Chollet F, Allaire J et al (2017) R interface to keras. https://github.com/rstudio/keras
4. Desmarais BA, Cranmer SJ, Hill C et al (2011) Forecasting the locational dynamics of transnational terrorism : a network analytic approach. In: European intelligence and security informatics conference, pp 171–177, https://doi.org/10.1109/EISIC.2011.44
5. Dhote Y, Mishra N (2013) Survey and analysis of temporal link prediction in online social networks. In: International conference on advances in computing, communications and informatics (ICACCI), pp 1178–1183