Author of the publication

Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms.

, , , and . WebSci, page 346-356. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities., , and . STM, volume 8203 of Lecture Notes in Computer Science, page 65-81. Springer, (2013)Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features., , , , , and . CoRR, (2019)Cryptocurrency wallets: assessment and security., , , , and . CoRR, (2023)On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models., , and . CoRR, (2022)Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System., , , and . CoRR, (2021)LEChain: A blockchain-based lawful evidence management scheme for digital forensics., , , and . Future Gener. Comput. Syst., (2021)A machine learning based approach to detect malicious android apps using discriminant system calls., , and . Future Gener. Comput. Syst., (2019)Private Blockchain in Industrial IoT., , , , , and . IEEE Netw., 34 (5): 76-77 (2020)Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery., , , , and . IEEE Secur. Priv., 18 (3): 8-16 (2020)Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey., , , and . ACM Comput. Surv., 55 (2): 44:1-44:36 (2023)