Author of the publication

Twitter zombie: architecture for capturing, socially transforming and analyzing the twittersphere.

, , , and . GROUP, page 229-238. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Twitter zombie: architecture for capturing, socially transforming and analyzing the twittersphere., , , and . GROUP, page 229-238. ACM, (2012)Investigating machine learning attacks on financial time series models., , , , , and . Comput. Secur., (2022)A Case Study of Credential Stuffing Attack: Canva Data Breach., , , and . CSCI, page 735-740. IEEE, (2021)Education Challenges Among Early Career Researchers in Medical Informatics., , , and . MIE, volume 316 of Studies in Health Technology and Informatics, page 1510-1514. IOS Press, (2024)Election indices dataset. (2012)Reviews of tertiary education: China, and . OECD, Paris, (2009)Blended Learning in Refugee Education: An Interim Report on the Foundations for All Project in Kampala and Kiryandongo, Uganda., , , , , , , , , and 1 other author(s). AFRICOMM, volume 443 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 510-526. Springer, (2021)The U.S. and the EU differences in anti-terrorism efforts.. ISI, page 55-58. IEEE, (2010)Social Intelligence in Completely Online Groups - Toward Social Prosthetics from Log Data Analysis and Transformation., , , and . SocialCom/PASSAT, page 500-507. IEEE Computer Society, (2010)Proportionality, Disproportionality and Electoral Systems. Electoral Studies, (1991)