Author of the publication

Detecting malware communities using socio-cultural cognitive mapping.

, , , , and . Comput. Math. Organ. Theory, 26 (3): 307-319 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting malware communities using socio-cultural cognitive mapping., , , , and . Comput. Math. Organ. Theory, 26 (3): 307-319 (2020)An Empirical Method for the Evaluation of Dynamic Network Simulation Methods., , and . IKE, page 358-364. CSREA Press, (2008)Influencing Network Graph Perception and Judgment: Effects of Direct Connections, Base Rates, and Visual Layout Proximity on Social Network Analysis., , , , , and . CogSci, cognitivesciencesociety.org, (2017)Self-attention aggregation network for video face representation and recognition., , , , , and . CoRR, (2020)MobileEssence: meeting capture on smartphones., and . Mobile HCI, page 262-263. ACM, (2006)The Digital Orationes Project: Interfacing a Restoration Manuscript., , , , , and . DH, page 502-503. Alliance of Digital Humanities Organizations (ADHO), (2013)The Time Machine: Capturing Worlds across Time in Texts., , , and . DH, page 164-166. Stanford University Library, (2011)Investigating the Statistical Assumptions of Naïve Bayes Classifiers., and . CISS, page 1-6. IEEE, (2021)On Locally Optimal Breaking of Complex Cyclic Vertical Constraints in VLSI Channel Routing.. Great Lakes Symposium on VLSI, page 92-95. IEEE Computer Society, (1996)On locally optimal breaking of nondisjoint cyclic vertical constraints in VLSI channel routing.. Great Lakes Symposium on VLSI, page 204-207. IEEE Computer Society, (1995)