default search action
Richard Frank
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Fateme Movahedi, Richard Frank:
Identifying key players in a network of child exploitation websites using Principal Component Analysis. Comput. Sci. J. Moldova 31(2): 143-168 (2023) - [c33]Barry Cartwright, Richard Frank, George Weir, Karmvir Padda, Sarah-May Strange:
Deploying Artificial Intelligence to Combat Covid-19 Misinformation on Social Media: Technological and Ethical Considerations. HICSS 2023: 2140-2149 - [c32]Shu Liu, Richard Frank, Noelle Warkentin:
Drugs for Sale! An Analysis and Estimation of Drug Products on the Cryptomarket Ecosystem. HICSS 2023: 3621-3630 - 2022
- [j6]Yuxuan (Cicilia) Zhang, Richard Frank, Noelle Warkentin, Naomi Zakimi:
Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure. J. Cybersecur. 8(1) (2022) - [j5]Barry Cartwright, Richard Frank, George Weir, Karmvir Padda:
Detecting and responding to hostile disinformation activities on social media using machine learning and deep neural networks. Neural Comput. Appl. 34(18): 15141-15163 (2022) - 2021
- [j4]Tiana Gaudette, Ryan Scrivens, Garth Davies, Richard Frank:
Upvoting extremism: Collective identity formation and the extreme right on Reddit. New Media Soc. 23(12) (2021) - [i1]Hamed Jelodar, Richard Frank:
Semantic Knowledge Discovery and Discussion Mining of Incel Online Community: Topic modeling. CoRR abs/2104.09586 (2021) - 2020
- [c31]Reagan Smith, Richard Frank:
Dishing the Deets: How Dark-Web Users Teach each other about International Drug Shipments. HICSS 2020: 1-10
2010 – 2019
- 2018
- [j3]Bryan Monk, Julianna Mitchell, Richard Frank, Garth Davies:
Uncovering Tor: An Examination of the Network Structure. Secur. Commun. Networks 2018: 4231326:1-4231326:12 (2018) - [c30]Andrew J. Park, Richard Frank, Alexander Mikhaylov, Myf Thomson:
Hackers Hedging Bets: A Cross-Community Analysis of Three Online Hacking Forums. ASONAM 2018: 798-805 - [c29]Richard Frank, Myfanwy Thomson, Alexander Mikhaylov, Andrew J. Park:
Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums. ISI 2018: 136-141 - 2017
- [c28]Nasser Alsadhan, David B. Skillicorn, Richard Frank:
Comparing SVD and word2vec for analysis of malware forum posts. ASONAM 2017: 1080-1086 - 2016
- [c27]Richard Frank, Mitch Macdonald, Bryan Monk:
Location, Location, Location: Mapping Potential Canadian Targets in Online Hacker Discussion Forums. EISIC 2016: 16-23 - [c26]Alexander Mikhaylov, Richard Frank:
Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering Schemes. EISIC 2016: 80-83 - [c25]Ryan Scrivens, Richard Frank:
Sentiment-based Classification of Radical Text on the Web. EISIC 2016: 104-107 - [c24]Ahmed T. Zulkarnine, Richard Frank, Bryan Monk, Julianna Mitchell, Garth Davies:
Surfacing collaborated networks in dark web to find illicit and criminal content. ISI 2016: 109-114 - 2015
- [c23]Russell Allsup, Evan Thomas, Bryan Monk, Richard Frank, Martin Bouchard:
Networking in Child Exploitation: Assessing disruption strategies using registrant information. ASONAM 2015: 400-407 - [c22]Mitch Macdonald, Richard Frank, Joseph Mei, Bryan Monk:
Identifying Digital Threats in a Hacker Web Forum. ASONAM 2015: 926-933 - [c21]Joseph Mei, Richard Frank:
Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler. ASONAM 2015: 1024-1027 - [c20]Ryan Scrivens, Garth Davies, Richard Frank, Joseph Mei:
Sentiment-Based Identification of Radical Authors (SIRA). ICDM Workshops 2015: 979-986 - [c19]Bryan Monk, Russell Allsup, Richard Frank:
LECENing places to hide: Geo-mapping child exploitation material. ISI 2015: 73-78 - 2014
- [j2]Vijay Kumar Mago, Richard Frank, Andrew A. Reid, Vahid Dabbaghian:
The strongest does not attract all but it does attract the most - evaluating the criminal attractiveness of shopping malls using fuzzy logic. Expert Syst. J. Knowl. Eng. 31(2): 121-135 (2014) - [p3]Andrew A. Reid, Richard Frank:
Celerity in the Courts: The Application of Fuzzy Logic to Model Case Complexity of Criminal Justice Systems. Theories and Simulations of Complex Social Systems 2014: 79-96 - [p2]Martin Bouchard, Kila Joffres, Richard Frank:
Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor. Computational Models of Complex Systems 2014: 171-184 - 2013
- [c18]Justin Song, Valerie Spicer, Patricia L. Brantingham, Richard Frank:
Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement. EISIC 2013: 75-82 - [c17]Andrew A. Reid, Mohammad A. Tayebi, Richard Frank:
Exploring the structural characteristics of social networks in a large criminal court database. ISI 2013: 209-214 - 2012
- [c16]Richard Frank:
SPORS: A Suspect Recommendation System Based on Offenders' Reconstructed Spatial Profile. EISIC 2012: 38-45 - [c15]Natalia Iwanski, Richard Frank, Andrew A. Reid, Vahid Dabbaghian:
A Computational Model for Predicting the Location of Crime Attractors on a Road Network. EISIC 2012: 60-67 - [c14]Richard Frank, Bryan Kinney:
How Many Ways Do Offenders Travel - Evaluating the Activity Paths of Offenders. EISIC 2012: 99-106 - [c13]Bryce Westlake, Martin Bouchard, Richard Frank:
Comparing Methods for Detecting Child Exploitation Content Online. EISIC 2012: 156-163 - [c12]Mohammad A. Tayebi, Richard Frank, Uwe Glässer:
Understanding the link between social and spatial distance in the crime world. SIGSPATIAL/GIS 2012: 550-553 - [c11]Justin Song, Richard Frank, Patricia L. Brantingham, Jim LeBeau:
Visualizing the spatial movement patterns of offenders. SIGSPATIAL/GIS 2012: 554-557 - 2011
- [j1]Richard Frank, Vahid Dabbaghian, Andrew A. Reid, Suraj K. Singh, Jonathan Cinnamon, Patricia L. Brantingham:
Power of Criminal Attractors: Modeling the Pull of Activity Nodes. J. Artif. Soc. Soc. Simul. 14(1) (2011) - [c10]Natalia Iwanski, Richard Frank, Vahid Dabbaghian, Andrew A. Reid, Patricia L. Brantingham:
Analyzing an Offender's Journey to Crime: A Criminal Movement Model (CriMM). EISIC 2011: 70-77 - [c9]Richard Frank, Martin A. Andresen, Connie Cheng, Patricia L. Brantingham:
Finding Criminal Attractors Based on Offenders' Directionality of Crimes. EISIC 2011: 86-93 - [c8]Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake:
Strategies to Disrupt Online Child Pornography Networks. EISIC 2011: 163-170 - [c7]Mohammad A. Tayebi, Mohsen Jamali, Martin Ester, Uwe Glässer, Richard Frank:
CrimeWalker: a recommendation model for suspect investigation. RecSys 2011: 173-180 - [p1]Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, Mohammad A. Tayebi:
Co-offending Network Mining. Counterterrorism and Open Source Intelligence 2011: 73-102 - 2010
- [c6]Richard Frank, Andrew J. Park, Patricia L. Brantingham, Joseph Clare, Kathryn Wuschke, Mona Vajihollahi:
Identifying high risk crime areas using topology. ISI 2010: 13-18
2000 – 2009
- 2009
- [c5]Richard Frank, Martin Ester, Arno J. Knobbe:
A multi-relational approach to spatial classification. KDD 2009: 309-318 - 2007
- [c4]Ghassan Hamarneh, Aaron D. Ward, Richard Frank:
Quantification and Visualization of Localized and Intuitive Shape Variability Using a Novel Medial-Based Shape Representation. ISBI 2007: 1232-1235 - [c3]Richard Frank, Flavia Moser, Martin Ester:
A Method for Multi-relational Classification Using Single and Multi-feature Aggregation Functions. PKDD 2007: 430-437 - [c2]Richard Frank, Wen Jin, Martin Ester:
Efficiently Mining Regional Outliers in Spatial Data. SSTD 2007: 112-129
1990 – 1999
- 1998
- [c1]Richard Anderson, Gopalan Arun, Richard Frank:
Oracle Rdb's Record Caching Model. SIGMOD Conference 1998: 526-527
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint