Author of the publication

An Empirical Study on Collective Online Behaviors of Extremist Supporters.

, , , and . ADMA, volume 10604 of Lecture Notes in Computer Science, page 445-459. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accurate in-network file-type classification., , and . SG-CRC, volume 14 of Cryptology and Information Security Series, page 139-146. IOS Press, (2016)A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification., and . SG-CRC, volume 15 of Cryptology and Information Security Series, page 57-69. IOS Press, (2017)Securing Android: A Survey, Taxonomy, and Challenges., , , and . ACM Comput. Surv., 47 (4): 58:1-58:45 (2015)Opportunistic Piggyback Marking for IP Traceback., , , and . IEEE Trans. Inf. Forensics Secur., 11 (2): 273-288 (2016)Progressive Control Flow Obfuscation for Android Applications., , and . TENCON, page 1075-1079. IEEE, (2018)SLIC: Self-Learning Intelligent Classifier for network traffic., , , and . Comput. Networks, (2015)A Novel Inequality-Based Fragmented File Carving Technique., and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 28-39. Springer, (2010)Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection., and . ITNAC, page 110-117. IEEE, (2023)A Generalized Links and Text Properties Based Forum Crawler., , and . Web Intelligence, page 113-120. IEEE Computer Society, (2012)Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving., , and . CIS, page 793-797. IEEE Computer Society, (2011)