Author of the publication

Terrorism and War: Twitter Cascade Analysis.

, , , , and . IDC, volume 798 of Studies in Computational Intelligence, page 309-318. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modularity in Multilayer Networks Using Redundancy-Based Resolution and Projection-Based Inter-Layer Coupling., , and . IEEE Trans. Netw. Sci. Eng., 7 (3): 1198-1214 (2020)The Cost of Trust in the Dynamics of Best Attachment., , , and . Comput. Informatics, 34 (1): 167-184 (2015)Terrorism and War: Twitter Cascade Analysis., , , , and . IDC, volume 798 of Studies in Computational Intelligence, page 309-318. Springer, (2018)Emerging structures of P2P networks induced by social relationships., , , and . Comput. Commun., 31 (3): 620-628 (2008)An adaptive overlay network inspired by social behaviour., , , and . J. Parallel Distributed Comput., 70 (3): 282-295 (2010)A Heuristic to Explore Trust Networks Dynamics., , , and . IDC, volume 511 of Studies in Computational Intelligence, page 67-76. Springer, (2013)Gain the Best Reputation in Trust Networks., , , and . IDC, volume 382 of Studies in Computational Intelligence, page 213-218. Springer, (2011)The Assessment of Expertise in Social Networks., , , and . IDC, volume 237 of Studies in Computational Intelligence, page 53-62. Springer, (2009)Trusting Evaluation by Social Reputation., , , and . IDC, volume 162 of Studies in Computational Intelligence, page 75-84. Springer, (2008)Hardware/software synthesis of formal specifications in codesign of embedded systems., , and . ACM Trans. Design Autom. Electr. Syst., 5 (3): 399-432 (2000)