Richard Frank

According to our database1, Richard Frank authored at least 44 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Identifying key players in a network of child exploitation websites using Principal Component Analysis.
Comput. Sci. J. Moldova, 2023

Drugs for Sale! An Analysis and Estimation of Drug Products on the Cryptomarket Ecosystem.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Deploying Artificial Intelligence to Combat Covid-19 Misinformation on Social Media: Technological and Ethical Considerations.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Detecting and responding to hostile disinformation activities on social media using machine learning and deep neural networks.
Neural Comput. Appl., 2022

Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure.
J. Cybersecur., 2022

2021
Upvoting extremism: Collective identity formation and the extreme right on Reddit.
New Media Soc., 2021

Semantic Knowledge Discovery and Discussion Mining of Incel Online Community: Topic modeling.
CoRR, 2021

2020
Dishing the Deets: How Dark-Web Users Teach each other about International Drug Shipments.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2018
Uncovering Tor: An Examination of the Network Structure.
Secur. Commun. Networks, 2018

Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Hackers Hedging Bets: A Cross-Community Analysis of Three Online Hacking Forums.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Comparing SVD and word2vec for analysis of malware forum posts.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Surfacing collaborated networks in dark web to find illicit and criminal content.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Sentiment-based Classification of Radical Text on the Web.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering Schemes.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

Location, Location, Location: Mapping Potential Canadian Targets in Online Hacker Discussion Forums.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2015
LECENing places to hide: Geo-mapping child exploitation material.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Sentiment-Based Identification of Radical Authors (SIRA).
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Identifying Digital Threats in a Hacker Web Forum.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Networking in Child Exploitation: Assessing disruption strategies using registrant information.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Celerity in the Courts: The Application of Fuzzy Logic to Model Case Complexity of Criminal Justice Systems.
Proceedings of the Theories and Simulations of Complex Social Systems, 2014

Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor.
Proceedings of the Computational Models of Complex Systems, 2014

The strongest does not attract all but it does attract the most - evaluating the criminal attractiveness of shopping malls using fuzzy logic.
Expert Syst. J. Knowl. Eng., 2014

2013
Exploring the structural characteristics of social networks in a large criminal court database.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

2012
Understanding the link between social and spatial distance in the crime world.
Proceedings of the SIGSPATIAL 2012 International Conference on Advances in Geographic Information Systems (formerly known as GIS), 2012

Visualizing the spatial movement patterns of offenders.
Proceedings of the SIGSPATIAL 2012 International Conference on Advances in Geographic Information Systems (formerly known as GIS), 2012

Comparing Methods for Detecting Child Exploitation Content Online.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

A Computational Model for Predicting the Location of Crime Attractors on a Road Network.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

How Many Ways Do Offenders Travel - Evaluating the Activity Paths of Offenders.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

SPORS: A Suspect Recommendation System Based on Offenders' Reconstructed Spatial Profile.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2011
Co-offending Network Mining.
Proceedings of the Counterterrorism and Open Source Intelligence, 2011

Power of Criminal Attractors: Modeling the Pull of Activity Nodes.
J. Artif. Soc. Soc. Simul., 2011

CrimeWalker: a recommendation model for suspect investigation.
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011

Strategies to Disrupt Online Child Pornography Networks.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Analyzing an Offender's Journey to Crime: A Criminal Movement Model (CriMM).
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Finding Criminal Attractors Based on Offenders' Directionality of Crimes.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Identifying high risk crime areas using topology.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

2009
A multi-relational approach to spatial classification.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

2007
Efficiently Mining Regional Outliers in Spatial Data.
Proceedings of the Advances in Spatial and Temporal Databases, 2007

A Method for Multi-relational Classification Using Single and Multi-feature Aggregation Functions.
Proceedings of the Knowledge Discovery in Databases: PKDD 2007, 2007

Quantification and Visualization of Localized and Intuitive Shape Variability Using a Novel Medial-Based Shape Representation.
Proceedings of the 2007 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2007

1998
Oracle Rdb's Record Caching Model.
Proceedings of the SIGMOD 1998, 1998


  Loading...