Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Profiles
My profile
My library
Hsinchun Chen
University of Arizona
Verified email at email.arizona.edu
Cited by 57720
business analytics
data mining
security informatics
health informatics
Uffe Kock Wiil
Professor, University of Southern Denmark
Verified email at mmmi.sdu.dk
Cited by 3063
health informatics
security informatics
social network analysis and mining
hypermedia
data-driven health technology
Dr. Majed AlRubaian
king saud university (KSU)
Verified email at ksu.edu.sa
Cited by 2231
Social Media Analysis
Social Computing
information credibility
Security Informatics
social cloud
Jonas Poelmans
Ocula Group
Verified email at oculagroup.com
Cited by 1942
Big Data
Data Mining
C++
Security Informatics
Health Informatics
Syed Muhammad Ahsan
Director Postgraduate Studies, Department of Software Engineering, University of Lahore
Verified email at se.uol.edu.pk
Cited by 825
Bioinformatics
Security Informatics
Distant Learning
Ontologies
Semantic Web
lei wang
Researcher at Institute of Automation, Chinese Academy of Sciences
Cited by 407
social media mining
NLP
Security informatics
Ivan Del Pozo
Msc. Systems and Computer Engineering
Verified email at estud.usfq.edu.ec
Cited by 41
Security Informatics
Mobile Apps
IoT
Smart Environments
Embedded Systems
Privacy
Terms
Help
About Scholar
Search help