Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

It Runs in the Family: Searching for Similar Names using Digitized Family Trees., , and . CoRR, (2019)Iterative query selection for opaque search engines with pseudo relevance feedback., , and . Expert Syst. Appl., (2022)Measurement of Online Discussion Authenticity within Online Social Media., , , and . ASONAM, page 627-629. ACM, (2017)It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees., , and . IEEE Trans. Knowl. Data Eng., 35 (2): 1651-1666 (2023)Detecting Clickbait in Online Social Media: You Won't Believe How We Did It., , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 377-387. Springer, (2022)Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT., , , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 76-91. Springer, (2023)Homing socialbots: intrusion on a specific organization's employee using Socialbots., , , and . ASONAM, page 1358-1365. ACM, (2013)Organizational Intrusion: Organization Mining Using Socialbots., , , and . SocialInformatics, page 7-12. IEEE Computer Society, (2012)Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media., , and . CoRR, (2017)The Security of Organizations and Individuals in Online Social Networks.. CoRR, (2016)