Author of the publication

Argumentation-Based Query Answering under Uncertainty with Application to Cybersecurity.

, , , and . Big Data Cogn. Comput., 6 (3): 91 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts., and . ICDIS, page 36-42. IEEE, (2019)Argumentation-Based Query Answering under Uncertainty with Application to Cybersecurity., , , and . Big Data Cogn. Comput., 6 (3): 91 (2022)Rule-Based Error Detection and Correction to Operationalize Movement Trajectory Classification., , and . CoRR, (2023)A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks., , , , , and . Data Science in Cybersecurity and Cyberthreat Intelligence, volume 177 of Intelligent Systems Reference Library, Springer, (2020)Cyber Threat Analysis with Structured Probabilistic Argumentation., , , and . AI³@AI*IA, volume 2528 of CEUR Workshop Proceedings, page 50-64. CEUR-WS.org, (2019)A Neuro-symbolic Approach to Argument Comparison in Structured Argumentation., , , , , and . AI³@AI*IA, volume 3546 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media., , , , and . WWW (Companion Volume), page 154-161. ACM, (2019)Understanding Information Flow in Cascades Using Network Motifs., , and . CoRR, (2019)MANCaLog: a logic for multi-attribute network cascades., , and . AAMAS, page 1175-1176. IFAAMAS, (2013)Early Warnings of Cyber Threats in Online Discussions., , , , , and . ICDM Workshops, page 667-674. IEEE Computer Society, (2017)