Shakarian, Paulo.
Overview
Works: | 1 works in 3 publications in 1 languages |
---|
Titles
Introduction to cyber-warfare = a multidisciplinary approach /
by:
Shakarian, Jana.; Shakarian, Paulo.; Ruef, Andrew.
(Language materials, printed)
Neuro symbolic reasoning and learning
by:
Shakarian, Paulo.; SpringerLink (Online service)
(Language materials, printed)
Cyber Warfare = Building the Scientific Foundation /
by:
Swarup, Vipin.; Jajodia, Sushil.; Wang, Cliff.; Shakarian, Paulo.; SpringerLink (Online service); Subrahmanian, V.S.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Artificial Intelligence Tools for Cyber Attribution
by:
Nunes, Eric.; Ruef, Andrew.; Shakarian, Paulo.; SpringerLink (Online service); Simari, Gerardo I.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Diffusion in social networks
by:
SpringerLink (Online service); Shakarian, Paulo.
(Language materials, printed)
Diffusion in Social Networks
by:
Bhatnagar, Abhivav.; Guo, Ruocheng.; Aleali, Ashkan.; Shaabani, Elham.; SpringerLink (Online service); Shakarian, Paulo.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Identification of Pathogenic Social Media Accounts = From Data to Intelligence to Prediction /
by:
Alvari, Hamidreza.; Shakarian, Paulo.; SpringerLink (Online service); Shaabani, Elham.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Subjects
Systems and Data Security.
Data protection.
Artificial intelligence.
Social networks
Computer Communication Networks.
Diffusion processes.
Machine learning.
Artificial Intelligence (incl. Robotics)
Application software.
Artificial Intelligence.
Data encryption (Computer science).
Information warfare
Mobile and Network Security.
Data Encryption.
Information Systems Applications (incl. Internet).
Computer networks
Computer Science.
Computer communication systems.
Security.
Computer crimes.
Data mining.
Cryptology.
Machine Learning.
Logic, Symbolic and mathematical.
Cyberspace
Computer security.
Cyberterrorism.
Data Mining and Knowledge Discovery.