From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DDoS cyber-attacks network: Who's attacking whom., и . ISI, стр. 218. IEEE, (2016)A Socio-Computational Approach to Predicting Bioweapon Proliferation., , , и . IEEE Trans. Comput. Social Systems, 5 (2): 458-467 (2018)Estimating the Near-Term Changes of an Organization with Simulations., и . AAAI Fall Symposium: Interaction and Emergent Phenomena in Societies of Agents, том FS-06-05 из AAAI Technical Report, стр. 111-118. AAAI Press, (2006)Its All in a Name: Detecting and Labeling Bots by Their Name., и . CoRR, (2018)Two Stage Job Title Identification System for Online Job Advertisements., , , и . IEEE Access, (2023)Deceptive accusations and concealed identities as misinformation campaign strategies., , и . Comput. Math. Organ. Theory, 27 (3): 302-323 (2021)The best of SBP-BRiMS.. Comput. Math. Organ. Theory, 26 (3): 277 (2020)Interoperable pipelines for social cyber-security: assessing Twitter information operations during NATO Trident Juncture 2018., , , , и . Comput. Math. Organ. Theory, 26 (4): 465-483 (2020)Check-ins in "Blau Space": Applying Blau's Macrosociological Theory to Foursquare Check-ins from New York City., , и . ACM Trans. Intell. Syst. Technol., 5 (3): 46:1-46:22 (2014)Combination of Empirical Study with Qualitative Simulation for Optimization Problem in Mobile Banking Adoption., , и . J. Artificial Societies and Social Simulation, (2013)