Author of the publication

Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches.

, , and . Social Netw. Analys. Mining, 1 (3): 241-254 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimation of Defects Based on Defect Decay Model: ED^3M., , , , and . IEEE Trans. Software Eng., 34 (3): 336-356 (2008)Goliath: A Configurable Approach for Network Testing., , and . TRIDENTCOM, page 1-9. IEEE, (2007)EAP methods for wireless networks., , and . Computer Standards & Interfaces, 29 (3): 289-301 (2007)Safe Driving Using Mobile Phones., , , , and . IEEE Trans. Intelligent Transportation Systems, 13 (3): 1462-1468 (2012)Defense against SPIT using community signals., and . ISI, page 232. IEEE, (2009)Tire-road friction estimation utilizing smartphones., and . IRI, page 855-858. IEEE, (2014)Behavior analysis of spam botnets., , , and . COMSWARE, page 246-253. IEEE, (2008)Unwanted SMTP Paths and Relays., and . COMSWARE, IEEE, (2007)Predicting Calls - New Service for an Intelligent Phone., and . MMNS, volume 4787 of Lecture Notes in Computer Science, page 26-37. Springer, (2007)Cuffless Differential Blood Pressure Estimation Using Smart Phones., , , , and . IEEE Trans. Biomed. Engineering, 60 (4): 1080-1089 (2013)