Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Case Study in Tailoring a Bio-InspiredCyber-Security Algorithm: DesigningAnomaly Detection for Multilayer Networks., , and . J. Cyber Secur. Mobil., 8 (1): 113-132 (2019)Designing for Massive Engagement in a Tween Community: Participation, Prevention, and Philanthropy in a Virtual Epidemic., , , , , , and . IDC, page 365-370. ACM, (2017)Assessing Seasonal Variation in Multisource Surveillance Data: Annual Harmonic Regression., , , and . BioSurveillance, volume 4506 of Lecture Notes in Computer Science, page 114-123. Springer, (2007)Mathematical Macrobiology: An Unexploited Opportunity in High School Education., and . BioMath in the Schools, volume 76 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 61-78. DIMACS/AMS, (2005)How public reaction to disease information across scales and the impacts of vector control methods influence disease prevalence and control efficacy., , and . PLoS Comput. Biol., (2021)Plagues and people: engineering player participation and prevention in a virtual epidemic., , , , and . FDG, page 29:1-29:10. ACM, (2017)A guide to choosing and implementing reference models for social network analysis., , , , , , and . CoRR, (2020)Revealing effective classifiers through network comparison, and . EPL (Europhysics Letters), 108 (3): 38001+ (Nov 1, 2014)Not your private tête-à-tête: leveraging the power of higher-order networks to study animal communication., , , , and . CoRR, (2023)A Case Study in Tailoring a Bio-Inspired Cyber-Security Algorithm: Designing Anomaly Detection for Multilayer Networks., , and . IEEE Symposium on Security and Privacy Workshops, page 281-286. IEEE Computer Society, (2018)