Author of the publication

Cyber Politics: Understanding the Use of Social Media for Dissident Movements in an Integrated State Stability Framework.

, and . ASONAM, page 1321-1328. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convergence of the boundary integral method for interfacial Stokes flow., , and . CoRR, (2021)Catastrophe Bond Trading Can Boost Security Improving Cyber (Re-)Insurance Markets., , and . AMCIS, Association for Information Systems, (2023)From Testing Theory to Test Driver Implementation., and . FME, volume 1051 of Lecture Notes in Computer Science, page 538-556. Springer, (1996)Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming., , , and . ICISSP, page 112-119. SCITEPRESS, (2024)Translation Validation., , and . TACAS, volume 1384 of Lecture Notes in Computer Science, page 151-166. Springer, (1998)Untwist your brain: efficient debugging and diagnosis of complex assertions., , and . DAC, page 644-647. ACM, (2009)A Preliminary Study of Peer-to-Peer Human-Robot Interaction, , , , , , , , , and 7 other author(s). International Conference on Systems, Man, and Cybernetics, IEEE, (October 2006)Extending the Limits of Sequentially Phased Reasoning., and . FSTTCS, volume 880 of Lecture Notes in Computer Science, page 402-413. Springer, (1994)Automatic Rule Derivation For Semantic Query Optimization.. Expert Database Conf., page 669-698. Benjamin/Cummings, (1988)Cyber Physical IoT Device Management Using a Lightweight Agent., , , and . iThings/GreenCom/CPSCom/SmartData, page 1009-1014. IEEE, (2019)