Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)., , , , , and . ACM Trans. Priv. Secur., 22 (2): 14:1-14:34 (2019)A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms., , , , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW2): 325:1-325:34 (2021)All your cards are belong to us: Understanding online carding forums., , and . eCrime, page 41-51. IEEE, (2017)BorderPatrol: Securing BYOD using Fine-Grained Contextual Information., , , and . DSN, page 460-472. IEEE, (2019)PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments., , and . WWW, page 3072-3078. ACM, (2019)Understanding the Incel Community on YouTube., , , , , and . CoRR, (2020)TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit., , , , , and . CoRR, (2021)Dissecting the Meme Magic: Understanding Indicators of Virality in Image Memes., , , , , and . CoRR, (2021)Non-Polar Opposites: Analyzing the Relationship Between Echo Chambers and Hostile Intergroup Interactions on Reddit., , , , , and . CoRR, (2022)TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to their Source Communities., , , , and . CoRR, (2023)