Author of the publication

A new approach to bot detection: Striking the balance between precision and recall.

, , , , and . ASONAM, page 533-540. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS cyber-attacks network: Who's attacking whom., and . ISI, page 218. IEEE, (2016)Canadian Federal Election and Hashtags that Do Not Belong., , and . SBP-BRiMS, volume 12268 of Lecture Notes in Computer Science, page 161-170. Springer, (2020)Editorial., and . Comput. Math. Organ. Theory, 1 (1): 5-7 (1995)Editor's Note., and . Comput. Math. Organ. Theory, 7 (2): 75-77 (2001)Deceptive accusations and concealed identities as misinformation campaign strategies., , and . Comput. Math. Organ. Theory, 27 (3): 302-323 (2021)Interoperable pipelines for social cyber-security: assessing Twitter information operations during NATO Trident Juncture 2018., , , , and . Comput. Math. Organ. Theory, 26 (4): 465-483 (2020)Two Stage Job Title Identification System for Online Job Advertisements., , , and . IEEE Access, (2023)Characterizing network dynamics of online hate communities around the COVID-19 pandemic., and . Appl. Netw. Sci., 6 (1): 20 (2021)Characterizing communities of hashtag usage on twitter during the 2020 COVID-19 pandemic by multi-view clustering., and . Appl. Netw. Sci., 5 (1): 66 (2020)Chirping Diplomacy: Analyzing Chinese State Social-Cyber Maneuvers on Twitter., , , and . SBP-BRiMS, volume 14161 of Lecture Notes in Computer Science, page 95-104. Springer, (2023)