ISSS608 2017-18 T3 Assign Hasanli Orkhan Conclusion

From Visual Analytics and Applications
Revision as of 23:07, 8 July 2018 by Orkhanh.2017 (talk | contribs)
Jump to navigation Jump to search

Network Main.png Detecting Suspicious Individuals

Overview

Methodology

Findings

Reference and Comments



Feel free to give your feedback

Acknowledgement

Supported by:

  • Prof. Kam Tin Seong


Reference