Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complex online harms and the smart home: A scoping review., , , , , , , , , and 2 other author(s). Future Gener. Comput. Syst., (December 2023)Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection., , , , and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 85-101. Springer, (2018)From Detection to Dissection: Unraveling Bot Characteristics in the VKontakte Social Network., and . COMSNETS, page 159-164. IEEE, (2024)Camouflaged bot detection using the friend list., , , and . PDP, page 253-259. IEEE, (2021)Voronoi Maps for Planar Sensor Networks Visualization., , , and . MobiSec, volume 971 of Communications in Computer and Information Science, page 96-109. Springer, (2017)Visual analysis of CAN bus traffic injection using radial bar charts., , and . ICPS, page 841-846. IEEE, (2018)Social bot metrics., and . Soc. Netw. Anal. Min., 13 (1): 36 (December 2023)Graph Visualization: Alternative Models Inspired by Bioinformatics., , , and . Sensors, 23 (7): 3747 (April 2023)Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams., , and . CD-ARES, volume 9817 of Lecture Notes in Computer Science, page 141-157. Springer, (2016)Analysis of the Malicious Bots Market., and . FRUCT, page 199-205. IEEE, (2021)