Author of the publication

Node-centric detection of overlapping communities in social networks.

, , and . ASONAM, page 1384-1385. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Malicious PowerShell Scripts Using Contextual Embeddings., , and . CoRR, (2019)Modeling infection methods of computer malware in the presence of vaccinations using epidemiological models: An analysis of real-world data., , and . CoRR, (2019)On the economic effects of the text completion interface: empirical analysis of financial markets., and . Electron. Mark., 31 (3): 717-735 (2021)An efficient generalized shift-rule for the prefer-max De Bruijn sequence., and . Discret. Math., 343 (2): 111657 (2020)An efficient shift rule for the prefer-max De Bruijn sequence., , , , , and . Discret. Math., 342 (1): 226-232 (2019)Modeling infection methods of computer malware in the presence of vaccinations using epidemiological models: an analysis of real-world data., , and . Int. J. Data Sci. Anal., 10 (4): 349-358 (2020)AMSI-Based Detection of Malicious PowerShell Code Using Contextual Embeddings., , and . AsiaCCS, page 679-693. ACM, (2020)Detection of malicious webmail attachments based on propagation patterns., , and . Knowl. Based Syst., (2018)Contention Detection and Resolution for Multiple-Access Power-Line Communications., and . IEEE Trans. Vehicular Technology, 56 (6): 3879-3887 (2007)An Efficient Shift Rule for the Prefer-Max De Bruijn Sequence., , , , , and . CoRR, (2017)