Author of the publication

Detecting insider threats in software systems using graph models of behavioral paths.

, , , , and . HotSoS, page 20:1-20:2. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Armed Conflicts in Online News: A Multilingual Study., and . ICWSM, page 309-318. AAAI Press, (2017)Types of Privacy Expectations., and . Frontiers Big Data, (2020)Embassies burning: toward a near-real-time assessment of social media using geo-temporal dynamic network analytics., , , and . Soc. Netw. Anal. Min., 4 (1): 195 (2014)Can Smartphone Co-locations Detect Friendship? It Depends How You Model It., , , , and . CoRR, (2020)This Sample seems to be good enough! Assessing Coverage and Temporal Reliability of Twitter's Academic API., , , , and . CoRR, (2022)Configuration to conviction: Network structures of political judiciary in the Austrian Corporate State., and . Soc. Networks, (2021)Unleashing Data Journalism's Potential: COVID-19 as Catalyst for Newsroom Transformation., and . CoRR, (2024)Archiving information from geotagged tweets to promote reproducibility and comparability in social media research., , , , and . Big Data Soc., 4 (2): 205395171773633 (December 2017)Improving team performance prediction in MMOGs with temporal communication networks., , and . Soc. Netw. Anal. Min., 11 (1): 65 (2021)Collecting egocentric network data with visual tools: A comparative study., , and . Netw. Sci., 8 (2): 223-250 (2020)