


default search action
Search dblp for Publications
export results for "toc:db/series/lnsn/oerk2013.bht:"
@incollection{DBLP:series/lnsn/0008SPCH13, author = {Yang Yang and Yizhou Sun and Saurav Pandit and Nitesh V. Chawla and Jiawei Han}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Perspective on Measurement Metrics for Community Detection Algorithms}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {227--242}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_12}, doi = {10.1007/978-94-007-6359-3\_12}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/0008SPCH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/AnastopoulosKA13, author = {Vasileios Anastopoulos and Panagiotis Karampelas and Reda Alhajj}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Developing a Hybrid Framework for a Web-Page Recommender System}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {161--181}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_9}, doi = {10.1007/978-94-007-6359-3\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/AnastopoulosKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/DasB13, author = {Dipankar Das and Sivaji Bandyopadhyay}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Holder and Topic Based Analysis of Emotions on Blog Texts: {A} Case Study for Bengali}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {127--143}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_7}, doi = {10.1007/978-94-007-6359-3\_7}, timestamp = {Wed, 14 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lnsn/DasB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/ElhajjEAAZAOORA13, author = {Ahmed Elhajj and Abdallah M. ElSheikh and Omar Addam and Mohamad Alzohbi and Omar Zarour and Alper Aksa{\c{c}} and Orkun {\"{O}}zt{\"{u}}rk and Tansel {\"{O}}zyer and Mick J. Ridley and Reda Alhajj}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Estimating the Importance of Terrorists in a Terror Network}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {267--283}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_14}, doi = {10.1007/978-94-007-6359-3\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/ElhajjEAAZAOORA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/FaghaniN13, author = {Mohammad Reza Faghani and Uyen Trang Nguyen}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {A Study of Malware Propagation via Online Social Networking}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {243--265}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_13}, doi = {10.1007/978-94-007-6359-3\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/FaghaniN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/FarrugiaHQ13, author = {Michael Farrugia and Neil Hurley and Aaron J. Quigley}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {{SAINT:} Supervised Actor Identification for Network Tuning}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {107--126}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_6}, doi = {10.1007/978-94-007-6359-3\_6}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/FarrugiaHQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/GuptaJ13, author = {Brij B. Gupta and Nadeem Jamali}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {145--159}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_8}, doi = {10.1007/978-94-007-6359-3\_8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lnsn/GuptaJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/JavanmardiMCFL13, author = {Sara Javanmardi and David W. McDonald and Rich Caruana and Sholeh Forouzan and Cristina V. Lopes}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Learning to Detect Vandalism in Social Content Systems: {A} Study on Wikipedia - Vandalism Detection in Wikipedia}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {203--225}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_11}, doi = {10.1007/978-94-007-6359-3\_11}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lnsn/JavanmardiMCFL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/JohanssonS13, author = {Fredrik Johansson and Pontus Svenson}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {41--61}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_3}, doi = {10.1007/978-94-007-6359-3\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/JohanssonS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/MurthyGTB13, author = {Dhiraj Murthy and Alexander Gross and Alexander Takata and Stephanie Bond}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Evaluation and Development of Data Mining Tools for Social Network Analysis}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {183--202}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_10}, doi = {10.1007/978-94-007-6359-3\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/MurthyGTB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/Nagle13, author = {Frank Nagle}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Privacy Breach Analysis in Social Networks}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {63--77}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_4}, doi = {10.1007/978-94-007-6359-3\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/Nagle13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/ObaliD13, author = {Murat Obali and Bunyamin Dursun}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {A Model for Dynamic Integration of Data Sources}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {1--14}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_1}, doi = {10.1007/978-94-007-6359-3\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/ObaliD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/ReidMH13, author = {Fergal Reid and Aaron F. McDaid and Neil J. Hurley}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Partitioning Breaks Communities}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {79--105}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_5}, doi = {10.1007/978-94-007-6359-3\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/ReidMH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lnsn/WangF13, author = {Qinna Wang and Eric Fleury}, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Overlapping Community Structure and Modular Overlaps in Complex Networks}, booktitle = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, pages = {15--40}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3\_2}, doi = {10.1007/978-94-007-6359-3\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/WangF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lnsn/2013oerk, editor = {Tansel {\"{O}}zyer and Zeki Erdem and Jon G. Rokne and Suheil Khoury}, title = {Mining Social Networks and Security Informatics}, series = {Lecture Notes in Social Networks}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6359-3}, doi = {10.1007/978-94-007-6359-3}, isbn = {978-94-007-6358-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lnsn/2013oerk.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.