Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums., , , and . ISI, page 136-141. IEEE, (2018)27 - A Quantitative Similarity Measure for Maps, and . Progress in Spatial Data Handling, Springer, Berlin Heidelberg, (2006)Oracle Rdb's Record Caching Model., , and . SIGMOD Conference, page 526-527. ACM Press, (1998)Drugs for Sale! An Analysis and Estimation of Drug Products on the Cryptomarket Ecosystem., , and . HICSS, page 3621-3630. ScholarSpace, (2023)Comparing SVD and word2vec for analysis of malware forum posts., , and . ASONAM, page 1080-1086. ACM, (2017)Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler., and . ASONAM, page 1024-1027. ACM, (2015)Networking in Child Exploitation: Assessing disruption strategies using registrant information., , , , and . ASONAM, page 400-407. ACM, (2015)Location, Location, Location: Mapping Potential Canadian Targets in Online Hacker Discussion Forums., , and . EISIC, page 16-23. IEEE Computer Society, (2016)Uncovering Tor: An Examination of the Network Structure., , , and . Secur. Commun. Networks, (2018)Power of Criminal Attractors: Modeling the Pull of Activity Nodes., , , , , and . J. Artif. Soc. Soc. Simul., (2011)