Richard Frank
According to our database1,
Richard Frank
authored at least 44 papers
between 1998 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Identifying key players in a network of child exploitation websites using Principal Component Analysis.
Comput. Sci. J. Moldova, 2023
Drugs for Sale! An Analysis and Estimation of Drug Products on the Cryptomarket Ecosystem.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
Deploying Artificial Intelligence to Combat Covid-19 Misinformation on Social Media: Technological and Ethical Considerations.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2022
Detecting and responding to hostile disinformation activities on social media using machine learning and deep neural networks.
Neural Comput. Appl., 2022
Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure.
J. Cybersecur., 2022
2021
New Media Soc., 2021
Semantic Knowledge Discovery and Discussion Mining of Incel Online Community: Topic modeling.
CoRR, 2021
2020
Dishing the Deets: How Dark-Web Users Teach each other about International Drug Shipments.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
2018
Secur. Commun. Networks, 2018
Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
2017
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017
2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
Location, Location, Location: Mapping Potential Canadian Targets in Online Hacker Discussion Forums.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015
Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Networking in Child Exploitation: Assessing disruption strategies using registrant information.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
Celerity in the Courts: The Application of Fuzzy Logic to Model Case Complexity of Criminal Justice Systems.
Proceedings of the Theories and Simulations of Complex Social Systems, 2014
Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor.
Proceedings of the Computational Models of Complex Systems, 2014
The strongest does not attract all but it does attract the most - evaluating the criminal attractiveness of shopping malls using fuzzy logic.
Expert Syst. J. Knowl. Eng., 2014
2013
Exploring the structural characteristics of social networks in a large criminal court database.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013
2012
Proceedings of the SIGSPATIAL 2012 International Conference on Advances in Geographic Information Systems (formerly known as GIS), 2012
Proceedings of the SIGSPATIAL 2012 International Conference on Advances in Geographic Information Systems (formerly known as GIS), 2012
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
A Computational Model for Predicting the Location of Crime Attractors on a Road Network.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
SPORS: A Suspect Recommendation System Based on Offenders' Reconstructed Spatial Profile.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
2011
Proceedings of the Counterterrorism and Open Source Intelligence, 2011
J. Artif. Soc. Soc. Simul., 2011
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011
Proceedings of the European Intelligence and Security Informatics Conference, 2011
Proceedings of the European Intelligence and Security Informatics Conference, 2011
Proceedings of the European Intelligence and Security Informatics Conference, 2011
2010
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010
2009
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009
2007
Proceedings of the Advances in Spatial and Temporal Databases, 2007
A Method for Multi-relational Classification Using Single and Multi-feature Aggregation Functions.
Proceedings of the Knowledge Discovery in Databases: PKDD 2007, 2007
Quantification and Visualization of Localized and Intuitive Shape Variability Using a Novel Medial-Based Shape Representation.
Proceedings of the 2007 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2007
1998