Kourtellis, Nicolas
255  results:
Search for persons X
?
3

Resilience of Blockchain Overlay Networks:

, In: Network and System Security; Lecture Notes in Computer Science,
 
?
5

NebulOuS: A Meta-Operating System with Cloud Continuum Brok..:

, In: 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC),
 
?
6

Exploring the Distinctive Tweeting Patterns of Toxic Twitte..:

, In: 2023 IEEE International Conference on Big Data (BigData),
Qayyum, Hina ; Ikram, Muhammad ; Zhao, Benjamin Zi Hao... - p. 3624-3633 , 2023
 
?
7

A longitudinal study of the top 1% toxic Twitter profiles:

, In: Proceedings of the 15th ACM Web Science Conference 2023,
Qayyum, Hina ; Zi Hao Zhao, Benjamin ; Wood, Ian... - p. 292-303 , 2023
 
?
 
?
9

Privacy-Preserving Online Content Moderation with Federated..:

, In: Companion Proceedings of the ACM Web Conference 2023,
 
?
11

Graph Analysis of Blockchain P2P Overlays and Their Securit..:

, In: Security and Privacy in Social Networks and Big Data; Lecture Notes in Computer Science,
 
?
12

On mission Twitter Profiles: A Study of Selective Toxic Beh..:

, In: 2023 IEEE International Conference on Big Data (BigData),
Qayyum, Hina ; Ikram, Muhammad ; Zhao, Benjamin Zi Hao... - p. 3634-3643 , 2023
 
?
13

Not only E.T. Phones Home: Analysing the Native User Tracki..:

, In: Proceedings of the 2023 ACM on Internet Measurement Conference,
 
?
14

FNDaaS: Content-agnostic Detection of Websites Distributing..:

, In: 2023 IEEE International Conference on Big Data (BigData),
 
1-15