Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are crowd-sourced CTI datasets ready for supporting anti-cybercrime intelligence?, , , and . Comput. Networks, (October 2023)TorrentGuard: Stopping scam and malware distribution in the BitTorrent ecosystem., , , , and . Comput. Networks, (2014)Environmental user-preference learning for smart homes: An autonomous approach., , , , and . J. Ambient Intell. Smart Environ., 2 (3): 327-342 (2010)Assessing the Evolution of Google+ in Its First Two Years., , , , and . IEEE/ACM Trans. Netw., 24 (3): 1813-1826 (2016)On the tweet arrival process at Twitter: analysis and applications., , , and . Trans. Emerg. Telecommun. Technol., 25 (2): 273-282 (2014)Understanding the Detection of View Fraud in Video Content Portals., , , , , , and . WWW, page 357-368. ACM, (2016)Understanding the evolution of multimedia content in the internet through bittorrent glasses., , , , and . IEEE Netw., 27 (6): 80-88 (2013)Multi-agent System for Controlling a Cloud Computing Environment., , , , and . EPIA, volume 8154 of Lecture Notes in Computer Science, page 13-20. Springer, (2013)Your Data in the Eyes of the Beholders: Design of a Unified Data Valuation Portal to Estimate Value of Personal Information from Market Perspective., , , , , and . ARES, page 701-705. IEEE Computer Society, (2016)Global optimization of arborescent multilevel inventory systems., , and . J. Glob. Optim., 6 (3): 269-292 (1995)