Author:
Bohacik Jan,Fuchs Antonin,Benedikovic Miroslav
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. User Behavior Analysis for Detecting Compromised User Accounts: A Review Paper;Cybernetics and Information Technologies;2023-09-01
2. A Survey on Social Media Influence Environment and Influencers Identification;Social Network Analysis and Mining;2022-10-03
3. Behavioral Anomaly Model for Detecting Compromised Accounts on a Social Network;Advances in Computational Collective Intelligence;2021
4. Handling SQL Databases in Automated System Test Generation;ACM Transactions on Software Engineering and Methodology;2020-10-06
5. You have been CAUTE!;Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining;2019-08-27