Difference between revisions of "ISSS608 2017-18 T3 Assign Hasanli Orkhan Conclusion"

From Visual Analytics and Applications
Jump to navigation Jump to search
Line 19: Line 19:
 
| style="font-family:Century Gothic; font-weight:bold; font-size:100%; text-align:center; background-color:#A8A8A8; width=25%" |  
 
| style="font-family:Century Gothic; font-weight:bold; font-size:100%; text-align:center; background-color:#A8A8A8; width=25%" |  
 
;
 
;
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan_Conclusion|<font color="#000000">Conclusion</font>]]
+
[[ISSS608_2017-18_T3_Assign_Hasanli Orkhan_Conclusion|<font color="#000000">Reference and Comments</font>]]
 
|}
 
|}
 
<br><br>
 
<br><br>

Revision as of 23:05, 8 July 2018

Network Main.png Detecting Suspicious Individuals

Overview

Methodology

Findings

Reference and Comments