Anomaly Detection Principles and Algorithms Other Books in This Series

Violence in Nigeria Violence in Nigeria
2015
Foreign Information Manipulation and Interference Foreign Information Manipulation and Interference
2025
Machine Learning Techniques to Predict Terrorist Attacks Machine Learning Techniques to Predict Terrorist Attacks
2025
Discovering Hidden Gems in Foreign Languages Discovering Hidden Gems in Foreign Languages
2023
Detecting Trust and Deception in Group Interaction Detecting Trust and Deception in Group Interaction
2021
A Machine Learning Based Model of Boko Haram A Machine Learning Based Model of Boko Haram
2020
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
2017
The Global Cyber-Vulnerability Report The Global Cyber-Vulnerability Report
2015
Indian Mujahideen Indian Mujahideen
2013