default search action
Michail Tsikerdekis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Michail Tsikerdekis, Sherali Zeadally, Iyad A. Katib:
Defenses Against Artificial Intelligence Attacks. Computer 57(11): 49-59 (2024) - 2023
- [j23]Michail Tsikerdekis, Sherali Zeadally:
Misinformation Detection Using Deep Learning. IT Prof. 25(5): 57-63 (2023) - [j22]Richard Li, Michail Tsikerdekis:
Hourly Network Anomaly Detection on HTTP Using Exponential Random Graph Models and Autoregressive Moving Average. J. Cybersecur. Priv. 3(3): 435-450 (2023) - 2021
- [j21]Michail Tsikerdekis, Scott Waldron, Alex Emanuelson:
Network Anomaly Detection Using Exponential Random Graph Models and Autoregressive Moving Average. IEEE Access 9: 134530-134542 (2021) - [j20]Matthew Carter, Michail Tsikerdekis, Sherali Zeadally:
Approaches for Fake Content Detection: Strengths and Weaknesses to Adversarial Attacks. IEEE Internet Comput. 25(2): 73-83 (2021) - [j19]Ky Tran, Sid Keene, Erik Fretheim, Michail Tsikerdekis:
Marine Network Protocols and Security Risks. J. Cybersecur. Priv. 1(2): 239-251 (2021) - 2020
- [j18]Michail Tsikerdekis, Sean Barret, Raleigh Hansen, Matthew Klein, Josh Orritt, Jason Whitmore:
Efficient Deep Learning Bot Detection in Games Using Time Windows and Long Short-Term Memory (LSTM). IEEE Access 8: 195763-195771 (2020) - [j17]Max Ismailov, Michail Tsikerdekis, Sherali Zeadally:
Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation. Future Internet 12(9): 148 (2020) - [j16]Sherali Zeadally, Michail Tsikerdekis:
Securing Internet of Things (IoT) with machine learning. Int. J. Commun. Syst. 33(1) (2020) - [j15]Michail Tsikerdekis, Sherali Zeadally:
Detecting Online Content Deception. IT Prof. 22(2): 35-44 (2020)
2010 – 2019
- 2019
- [j14]Michail Tsikerdekis, Taylor Morse, Cari Dean, Jason Ruffin:
A taxonomy of features for preventing identity deception in online communities and their estimated efficacy. J. Inf. Secur. Appl. 47: 363-370 (2019) - [j13]Qiang Hao, David H. Smith IV, Naitra Iriumi, Michail Tsikerdekis, Amy J. Ko:
A Systematic Investigation of Replications in Computing Education Research. ACM Trans. Comput. Educ. 19(4): 42:1-42:18 (2019) - [c4]Qiang Hao, Michail Tsikerdekis:
How Automated Feedback is Delivered Matters: Formative Feedback and Knowledge Transfer. FIE 2019: 1-6 - 2018
- [j12]Michail Tsikerdekis:
Persistent code contribution: a ranking algorithm for code contribution in crowdsourced software. Empir. Softw. Eng. 23(4): 1871-1894 (2018) - [j11]Michail Tsikerdekis:
Real-Time Identity-Deception Detection Techniques for Social Media: Optimizations and Challenges. IEEE Internet Comput. 22(5): 35-45 (2018) - [c3]Michail Tsikerdekis, Sherali Zeadally, Amy Schlesener, Nicolas Sklavos:
Approaches for Preventing Honeypot Detection and Compromise. GIIS 2018: 1-6 - [c2]Lauren Heller, Michail Tsikerdekis:
Selective Equation Constructor: A Scalable Genetic Algorithm. INISTA 2018: 1-10 - 2017
- [j10]Michail Tsikerdekis:
Designing a Successful Collaborative Wiki: The Choice between Outcome Quality and Online Community Needs. Int. J. Technol. Hum. Interact. 13(2): 22-39 (2017) - [j9]Michail Tsikerdekis:
Cumulative Experience and Recent Behavior and their Relation to Content Quality on Wikipedia. Interact. Comput. 29(5): 737-754 (2017) - [j8]David Nemer, Michail Tsikerdekis:
Political engagement and ICTs: Internet use in marginalized communities. J. Assoc. Inf. Sci. Technol. 68(6): 1539-1550 (2017) - [j7]Michail Tsikerdekis:
Identity Deception Prevention Using Common Contribution Network Data. IEEE Trans. Inf. Forensics Secur. 12(1): 188-199 (2017) - 2016
- [j6]Michail Tsikerdekis:
Personal communication networks and their positive effects on online collaboration and outcome quality on Wikipedia. J. Assoc. Inf. Sci. Technol. 67(4): 812-823 (2016) - 2015
- [j5]Michail Tsikerdekis, Sherali Zeadally:
Detecting and Preventing Online Identity Deception in Social Networking Services. IEEE Internet Comput. 19(3): 41-49 (2015) - 2014
- [j4]Michail Tsikerdekis, Sherali Zeadally:
Online deception in social media. Commun. ACM 57(9): 72-80 (2014) - [j3]Michail Tsikerdekis, Sherali Zeadally:
Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior. IEEE Trans. Inf. Forensics Secur. 9(8): 1311-1321 (2014) - 2013
- [j2]Michail Tsikerdekis:
The effects of perceived anonymity and anonymity states on conformity and groupthink in online communities: A Wikipedia study. J. Assoc. Inf. Sci. Technol. 64(5): 1001-1015 (2013) - [c1]Michail Tsikerdekis:
Dynamic Voting Interface in Social Media: Does it Affect Individual Votes? SOFSEM 2013: 552-563 - 2012
- [j1]Michail Tsikerdekis:
The choice of complete anonymity versus pseudonymity for aggression online. e Minds Int. J. Hum. Comput. Interact. 2(8) (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint