Author of the publication

The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources

, , , , , , , and . (2017)cite arxiv:1705.06947Comment: To appear in the 17th ACM Internet Measurement Conference (IMC 2017).

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-polar Opposites: Analyzing the Relationship between Echo Chambers and Hostile Intergroup Interactions on Reddit., , , , , and . ICWSM, page 197-208. AAAI Press, (2023)"It may be a pain in the backside but..." Insights into the resilience of business after GDPR., , and . NSPW, page 21-34. ACM, (2022)Meta-modelling for Ecosystems Security., , and . SimuTools, volume 424 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 259-283. Springer, (2021)From MDP to POMDP and Back: Safety and Compositionality., , , and . ECC, page 1-6. IEEE, (2023)Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)., , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 271-279. Springer, (2016)Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web., , , , , and . CoRR, (2018)Compositional Security Modelling - Structure, Economics, and Behaviour., , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 233-245. Springer, (2014)Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls., , , , , and . CoRR, (2018)The U.S. Vulnerabilities Equities Process: An Economic Perspective., , and . GameSec, volume 10575 of Lecture Notes in Computer Science, page 131-150. Springer, (2017)Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT., , , , , , and . USENIX Security Symposium, page 1541-1558. USENIX Association, (2023)