Author of the publication

Offensive Information Warfare Revisited: Social Media Use in Man-Made Crises.

, , and . Int. J. Inf. Syst. Soc. Chang., 7 (2): 1-26 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Expert-Based Fusion Algorithm of an Ensemble of Anomaly Detection Algorithms., , , , and . TAAI, volume 8916 of Lecture Notes in Computer Science, page 114-123. Springer, (2014)Sensor networks: From dependence analysis via matroid bases to online synthesis., , and . Theor. Comput. Sci., (2014)Explaining small business InfoSec posture using social theories., , and . Inf. Comput. Secur., 24 (5): 534-556 (2016)Offensive Information Warfare Revisited: Social Media Use in Man-Made Crises., , and . Int. J. Inf. Syst. Soc. Chang., 7 (2): 1-26 (2016)Sensor Networks: from Dependence Analysis Via Matroid Bases to Online Synthesis, , and . CoRR, (2012)Reputation Prediction of Anomaly Detection Algorithms for Reliable System., , , and . SwSTE, page 19-23. IEEE, (2014)Brief Announcement: Image Authentication Using Hyperspectral Layers., and . CSCML, volume 10879 of Lecture Notes in Computer Science, page 181-183. Springer, (2018)A study on anomaly detection ensembles., , , , and . J. Appl. Log., (2017)Lightweight adaptive Random-Forest for IoT rule generation and execution., , and . J. Inf. Secur. Appl., (2017)Sensor Fusion: From Dependence Analysis via Matroid Bases to Online Synthesis., , and . ALGOSENSORS, volume 7111 of Lecture Notes in Computer Science, page 42-56. Springer, (2011)