Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Socio-Computational Approach to Predicting Bioweapon Proliferation., , , and . IEEE Trans. Comput. Social Systems, 5 (2): 458-467 (2018)Its All in a Name: Detecting and Labeling Bots by Their Name., and . CoRR, (2018)Estimating the Near-Term Changes of an Organization with Simulations., and . AAAI Fall Symposium: Interaction and Emergent Phenomena in Societies of Agents, volume FS-06-05 of AAAI Technical Report, page 111-118. AAAI Press, (2006)Combination of Empirical Study with Qualitative Simulation for Optimization Problem in Mobile Banking Adoption., , and . J. Artificial Societies and Social Simulation, (2013)Characterizing Bot Networks on Twitter: An Empirical Analysis of Contentious Issues in the Asia-Pacific., and . SBP-BRiMS, volume 11549 of Lecture Notes in Computer Science, page 153-162. Springer, (2019)Simulating Complex Social-Behavioral Systems.. SpringSim, page 1-12. IEEE, (2019)Complex Networks for Terrorist Target Prediction., , and . SBP-BRiMS, volume 10899 of Lecture Notes in Computer Science, page 348-353. Springer, (2018)An Agent-Based Model for Simultaneous Phone and SMS Traffic over Time., , and . SBP, volume 7812 of Lecture Notes in Computer Science, page 65-74. Springer, (2013)Graph-Hist: Graph Classification from Latent Feature Histograms With Application to Bot Detection., , and . CoRR, (2019)A Complex Networks Approach to Find Latent Clusters of Terrorist Groups., , and . CoRR, (2020)