Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior., , , , , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 352-360. Springer, (2014)Deploy, Connect and Execute Scientific Models., , , , , and . CISIS, volume 1194 of Advances in Intelligent Systems and Computing, page 83-96. Springer, (2020)Twitter: who gets caught? observed trends in social micro-blogging spam., , , , , , , , and . WebSci, page 33-41. ACM, (2014)The influence of social norms on synchronous versus asynchronous communication technologies., , , and . PDM@ACM Multimedia, page 39-42. ACM, (2013)A Web-Based Decision Support Platform for Multidimensional Modeling of Complex Engineering Systems., , , , and . EWG-DSS, volume 184 of Lecture Notes in Business Information Processing, page 45-56. Springer, (2013)A malicious activity detection system utilizing predictive modeling in complex environments., , , , , , , and . CCNC, page 371-379. IEEE, (2014)The Multidimensional Hierarchically Integrated Framework (MHIF) for Modeling Complex Engineering Systems., , , , and . CSDM, page 301-313. Springer, (2013)Towards Cloud-Based Decision Support Platform for Group Decision Making., , , and . SMC, page 50-55. IEEE, (2013)Applied Semiotics in the Context of Open Government Data (OGD) Portals in the Arab Gulf., , , and . IHSI, volume 722 of Advances in Intelligent Systems and Computing, page 680-685. Springer, (2018)If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts., , , , , , , , and . Int. J. Inf. Sec., 15 (5): 475-491 (2016)