Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study of Static Classification of Social Spam Profiles in MySpace., , and . ICWSM, The AAAI Press, (2010)A study on evolution of email spam over fifteen years., , and . CollaborateCom, page 1-10. ICST / IEEE, (2013)Large Online Social Footprints - An Emerging Threat., , , and . CSE (3), page 271-276. IEEE Computer Society, (2009)An Observation-Based Approach to Performance Characterization of Distributed n-Tier Applications., , , , , , , , , and . IISWC, page 161-170. IEEE Computer Society, (2007)A Perspective of Evolution After Five Years: A Large-Scale Study of Web Spam Evolution., , and . Int. J. Cooperative Inf. Syst., (2014)Reverse Social Engineering Attacks in Online Social Networks., , , , and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 55-74. Springer, (2011)Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years., , and . EAI Endorsed Trans. Collaborative Computing, 1 (1): e3 (2014)Beyond Artificial Reality: Finding and Monitoring Live Events from Social Sensors., , , , , , , and . ACM Trans. Internet Techn., 20 (1): 2:1-2:21 (2020)A social-spam detection framework., , and . CEAS, page 46-54. ACM, (2011)SPADE: a social-spam analytics and detection framework., , and . Soc. Netw. Anal. Min., 4 (1): 189 (2014)