Book titles in this series
-
-
Detecting Trust and Deception in Group Interaction
- Editors:
-
- V. S. Subrahmanian
- Judee K. Burgoon
- Norah E. Dunbar
- Copyright: 2021
Available Renditions
- Hard cover
- Soft cover
- eBook
-
A Machine Learning Based Model of Boko Haram
- Authors:
-
- V. S. Subrahmanian
- Chiara Pulice
- James F. Brown
- Jacob Bonen-Clark
- Copyright: 2021
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Anomaly Detection Principles and Algorithms
- Authors:
-
- Kishan G. Mehrotra
- Chilukuri K. Mohan
- HuaMing Huang
- Copyright: 2017
Available Renditions
- Hard cover
- Soft cover
- eBook
-
The Global Cyber-Vulnerability Report
- Authors:
-
- V.S. Subrahmanian
- Michael Ovelgonne
- Tudor Dumitras
- Aditya Prakash
- Copyright: 2015
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Threats and Counter Efforts
- Editors:
-
- Maurizio Martellini
- Andrea Malizia
- Copyright: 2017
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Violence in Nigeria
Patterns and Trends
- Authors:
-
- Patricia Taft
- Nate Haken
- Copyright: 2015
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Indian Mujahideen
Computational Analysis and Public Policy
- Authors:
-
- V.S. Subrahmanian
- Aaron Mannes
- Animesh Roul
- R.K. Raghavan
- Copyright: 2013
Available Renditions
- Hard cover
- Soft cover
- eBook