Arama Sonu&ccedil;lar&#305; Mining. - Daralt&#305;lm&#305;&#351;: Criminology. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dMining.$0026qf$003dSUBJECT$002509Konu$002509Criminology.$002509Criminology.$0026ic$003dtrue$0026ps$003d300? 2024-09-23T17:24:10Z Mining Social Networks and Security Informatics ent://SD_ILS/0/SD_ILS:336224 2024-09-23T17:24:10Z 2024-09-23T17:24:10Z Yazar&#160;&Ouml;zyer, Tansel. editor.&#160;Erdem, Zeki. editor.&#160;Rokne, Jon. editor.&#160;Khoury, Suheil. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(336224.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6359-3">http://dx.doi.org/10.1007/978-94-007-6359-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine Learning Risk Assessments in Criminal Justice Settings ent://SD_ILS/0/SD_ILS:484674 2024-09-23T17:24:10Z 2024-09-23T17:24:10Z Yazar&#160;Berk, Richard. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-02272-3">https://doi.org/10.1007/978-3-030-02272-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of Computational Approaches to Counterterrorism ent://SD_ILS/0/SD_ILS:331739 2024-09-23T17:24:10Z 2024-09-23T17:24:10Z Yazar&#160;Subrahmanian, V.S. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331739.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5311-6">http://dx.doi.org/10.1007/978-1-4614-5311-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Indian Mujahideen Computational Analysis and Public Policy ent://SD_ILS/0/SD_ILS:332949 2024-09-23T17:24:10Z 2024-09-23T17:24:10Z Yazar&#160;Subrahmanian, V.S. author.&#160;Mannes, Aaron. author.&#160;Roul, Animesh. author.&#160;Raghavan, R.K. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332949.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02818-7">http://dx.doi.org/10.1007/978-3-319-02818-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Methods for Counterterrorism ent://SD_ILS/0/SD_ILS:189900 2024-09-23T17:24:10Z 2024-09-23T17:24:10Z Yazar&#160;Argamon, Shlomo. editor.&#160;Howard, Newton. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01141-2">http://dx.doi.org/10.1007/978-3-642-01141-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>