From post

An Empirical Study on Collective Online Behaviors of Extremist Supporters.

, , , и . ADMA, том 10604 из Lecture Notes in Computer Science, стр. 445-459. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Accurate in-network file-type classification., , и . SG-CRC, том 14 из Cryptology and Information Security Series, стр. 139-146. IOS Press, (2016)A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification., и . SG-CRC, том 15 из Cryptology and Information Security Series, стр. 57-69. IOS Press, (2017)A Novel Inequality-Based Fragmented File Carving Technique., и . e-Forensics, том 56 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 28-39. Springer, (2010)Securing Android: A Survey, Taxonomy, and Challenges., , , и . ACM Comput. Surv., 47 (4): 58:1-58:45 (2015)SLIC: Self-Learning Intelligent Classifier for network traffic., , , и . Comput. Networks, (2015)Progressive Control Flow Obfuscation for Android Applications., , и . TENCON, стр. 1075-1079. IEEE, (2018)Opportunistic Piggyback Marking for IP Traceback., , , и . IEEE Trans. Inf. Forensics Secur., 11 (2): 273-288 (2016)Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection., и . ITNAC, стр. 110-117. IEEE, (2023)Using Low Level Gradient Channels for Computationally Efficient Object Detection and Its Application in Logo Detection., и . ISM, стр. 229-232. IEEE Computer Society, (2012)An Improved Double Compression Detection Method for JPEG Image Forensics., , и . ISM, стр. 290-297. IEEE Computer Society, (2012)