Author of the publication

Designing ethical phishing experiments: a study of (ROT13) rOnl query features.

, and . WWW, page 513-522. ACM, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The role of information diffusion in the evolution of social networks, , , , , , , , and . Proc. 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), (2013)Badvertisements: Stealthy Click-Fraud with Unwitting Accessories., , and . J. Digital Forensic Practice, 1 (2): 131-142 (2006)Truthy: mapping the spread of astroturf in microblog streams., , , , , , and . WWW (Companion Volume), page 249-252. ACM, (2011)Traffic in Social Media I: Paths Through Information Networks., , and . SocialCom/PASSAT, page 452-458. IEEE Computer Society, (2010)Predicting the Political Alignment of Twitter Users., , , , and . SocialCom/PASSAT, page 192-199. IEEE Computer Society, (2011)Designing ethical phishing experiments: a study of (ROT13) rOnl query features., and . WWW, page 513-522. ACM, (2006)Detecting and Tracking Political Abuse in Social Media, , , , , and . Proc. 5th International AAAI Conference on Weblogs and Social Media (ICWSM), (2011)OSoMe: The IUNI observatory on social media., , , , , , , , , and 19 other author(s). PeerJ Prepr., (2016)Characterizing and Modeling the Dynamics of Online Popularity, , , , and . Physical Review Letters, 105 (15): 158701+ (October 2010)Political Polarization on Twitter., , , , , and . ICWSM, (2011)