14 books • 5 series
The Android Malware Handbook
A Machine Learning Based Model of Boko Haram (Terrorism, Security, and Computation)
The Global Cyber-Vulnerability Report (Terrorism, Security, and Computation)
Handbook of Computational Approaches to Counterterrorism
Data-driven Generation of Policies (SpringerBriefs in Computer Science) (Springer Briefs in Computer Science)
A General Framework for Reasoning On Inconsistency (SpringerBriefs in Computer Science)
Principles of Multimedia Database Systems, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
Geospatial Abduction: Principles and Practice
Geospatial Abduction
Heterogeneous Agent Systems (The MIT Press)
Multimedia Tools and Applications
Principles of Multimedia Database Systems (The Morgan Kaufmann Series in Data Management Systems)
Advanced Database Systems (The Morgan Kaufmann Series in Data Management Systems)