Terrorism, Security, and Computation
Subrahmanian / Burgoon / Dunbar
Detecting Trust and Deception in Group Interaction
Detecting Trust and Deception in Group Interaction
Subrahmanian / Pulice / Brown
A Machine Learning Based Model of Boko Haram
A Machine Learning Based Model of Boko Haram
Subrahmanian / Ovelgonne / Dumitras
The Global Cyber-Vulnerability Report
The Global Cyber-Vulnerability Report
Martellini / Malizia
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Threats and Counter Efforts
Mehrotra / Mohan / Huang
Anomaly Detection Principles and Algorithms
Anomaly Detection Principles and Algorithms