Author of the publication

File Toolkit for Selective Analysis & Reconstruction (FileTSAR) for Large-Scale Networks.

, , , , , , , and . IEEE BigData, page 3059-3065. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing the relationship between autistic traits and cyberdeviancy in a sample of college students., , and . Behav. Inf. Technol., 34 (5): 533-542 (2015)Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives., , and . ICDF2C, volume 157 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 143-175. Springer, (2015)Deviant Pornography Use: The Role of Early-Onset Adult Pornography Use and Individual Differences.. Int. J. Cyber Behav. Psychol. Learn., 6 (3): 34-47 (2016)Does deviant pornography use follow a Guttman-like progression?, and . Comput. Hum. Behav., 29 (5): 1997-2003 (2013)Implications of Using Internet Sting Corpora to Approximate Underage Victims., , and . ACL/IJCNLP (Findings), volume ACL/IJCNLP 2021 of Findings of ACL, page 3645-3656. Association for Computational Linguistics, (2021)Peer attachment, sexual experiences, and risky online behaviors as predictors of sexting behaviors among undergraduate students., and . Comput. Hum. Behav., (2014)Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings.. Digital Investigation, 11 (4): 252-260 (2014)Using Internet Artifacts to Profile a Child Pornography Suspect., and . J. Digit. Forensics Secur. Law, 9 (1): 57-66 (2014)Differentiating Cyberbullies and Internet Trolls by Personality Characteristics and Self-Esteem., and . J. Digit. Forensics Secur. Law, 11 (3): 7-26 (2016)A comparative forensic analysis of privacy enhanced web browsers and private browsing modes of common web browsers., , and . IJESDF, 10 (4): 356-371 (2018)