Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Arrange-A-Space: tabletop interfaces and gender collaboration., , , , and . CHI Extended Abstracts, page 1495-1500. ACM, (2011)An integrated semiconductor device enabling non-optical genome sequencing, , , , , , , , , and 34 other author(s). Nature, 475 (7356): 348--352 (July 2011)Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)., , , , , , , and . WWW (Companion Volume), page 1311-1314. ACM, (2017)Data quality measures for identity resolution.. Lancaster University, UK, (2018)British Library, EThOS.Automatically Dismantling Online Dating Fraud., , , , , and . CoRR, (2019)Text generation for dataset augmentation in security classification tasks., and . CoRR, (2023)AMoC: A Multifaceted Machine Learning-based Toolkit for Analysing Cybercriminal Communities on the Darknet., , , , and . IEEE BigData, page 2516-2524. IEEE, (2021)Achieving Multi-port Memory Performance on Single-Port Memory with Coding Techniques., , , , and . ICICT, page 366-375. IEEE, (2020)Identifying Unintended Harms of Cybersecurity Countermeasures., , , , , , and . eCrime, page 1-15. IEEE, (2019)Scamming the Scammers: Towards Automatic Detection of Persuasion in Advance Fee Frauds., , and . WWW (Companion Volume), page 1291-1299. ACM, (2017)