From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter., , , , , и . Mach. Learn. Knowl. Extr., 2 (3): 192-215 (2020)Profiling online social networks users: an omniopticon tool., , , и . IJSNM, 2 (4): 293-313 (2017)The Insider Threat in Cloud Computing., , и . CRITIS, том 6983 из Lecture Notes in Computer Science, стр. 93-103. Springer, (2011)Insiders Trapped in the Mirror Reveal Themselves in Social Media., , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 220-235. Springer, (2013)Approaching Encryption through Complex Number Logarithms., , и . SECRYPT, стр. 574-579. SciTePress, (2013)Youtube User and Usage Profiling: Stories of Political Horror and Security Success., , , и . ICETE (Selected Papers), том 456 из Communications in Computer and Information Science, стр. 270-289. Springer, (2013)Web Services Security Assessment: An Authentication-Focused Approach., и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 561-566. Springer, (2012)Proactive insider threat detection through social media: the YouTube case., , , и . WPES, стр. 261-266. ACM, (2013)Which Side Are You On? - A New Panopticon vs. Privacy., , , и . SECRYPT, стр. 98-110. SciTePress, (2013)Insider Threat: Enhancing BPM through Social Media., , , и . NTMS, стр. 1-6. IEEE, (2014)