Online deception in social media M Tsikerdekis, S Zeadally Communications of the ACM 57 (9), 72-80, 2014 | 215 | 2014 |
Multiple account identity deception detection in social media using nonverbal behavior M Tsikerdekis, S Zeadally IEEE Transactions on Information Forensics and Security 9 (8), 1311-1321, 2014 | 131 | 2014 |
Securing Internet of Things (IoT) with machine learning S Zeadally, M Tsikerdekis International Journal of Communication Systems 33 (1), e4169, 2020 | 100 | 2020 |
The effects of perceived anonymity and anonymity states on conformity and groupthink in online communities: AW ikipedia study M Tsikerdekis Journal of the American Society for Information Science and Technology 64 (5 …, 2013 | 94 | 2013 |
A systematic investigation of replications in computing education research Q Hao, DH Smith IV, N Iriumi, M Tsikerdekis, AJ Ko ACM Transactions on Computing Education (TOCE) 19 (4), 1-18, 2019 | 55 | 2019 |
Approaches for preventing honeypot detection and compromise M Tsikerdekis, S Zeadally, A Schlesener, N Sklavos 2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2018 | 53 | 2018 |
Towards Understanding Online Question & Answer Interactions and their effects on student performance in large-scale STEM classes DH Smith IV, Q Hao, V Dennen, M Tsikerdekis, B Barnes, L Martin, ... International Journal of Educational Technology in Higher Education 17, 1-15, 2020 | 41 | 2020 |
Identity deception prevention using common contribution network data M Tsikerdekis IEEE Transactions on Information Forensics and Security 12 (1), 188-199, 2016 | 37 | 2016 |
Detecting and preventing online identity deception in social networking services M Tsikerdekis, S Zeadally IEEE Internet Computing 19 (3), 41-49, 2015 | 36 | 2015 |
Political engagement and ICTs: Internet use in marginalized communities D Nemer, M Tsikerdekis Journal of the Association for Information Science and Technology 68 (6 …, 2017 | 34 | 2017 |
Marine network protocols and security risks K Tran, S Keene, E Fretheim, M Tsikerdekis Journal of Cybersecurity and Privacy 1 (2), 239-251, 2021 | 30 | 2021 |
The choice of complete anonymity versus pseudonymity for aggression online M Tsikerdekis eMinds International Journal on Human-Computer Interaction 2 (8), 35-57, 2012 | 28 | 2012 |
How automated feedback is delivered matters: Formative feedback and knowledge transfer Q Hao, M Tsikerdekis 2019 IEEE Frontiers in Education Conference (FIE), 1-6, 2019 | 19 | 2019 |
Approaches for fake content detection: Strengths and weaknesses to adversarial attacks M Carter, M Tsikerdekis, S Zeadally IEEE Internet Computing 25 (2), 73-83, 2020 | 17 | 2020 |
Network anomaly detection using exponential random graph models and autoregressive moving average M Tsikerdekis, S Waldron, A Emanuelson IEEE Access 9, 134530-134542, 2021 | 12 | 2021 |
Vulnerabilities to online social network identity deception detection research and recommendations for mitigation M Ismailov, M Tsikerdekis, S Zeadally Future Internet 12 (9), 148, 2020 | 12 | 2020 |
Real-time identity-deception detection techniques for social media: optimizations and challenges M Tsikerdekis IEEE Internet Computing 22 (5), 35-45, 2017 | 10 | 2017 |
Persistent code contribution: a ranking algorithm for code contribution in crowdsourced software M Tsikerdekis Empirical Software Engineering 23 (4), 1871-1894, 2018 | 8 | 2018 |
Personal communication networks and their positive effects on online collaboration and outcome quality on W ikipedia M Tsikerdekis Journal of the Association for Information Science and Technology 67 (4 …, 2016 | 8 | 2016 |
Efficient deep learning bot detection in games using time windows and long short-term memory (lstm) M Tsikerdekis, S Barret, R Hansen, M Klein, J Orritt, J Whitmore IEEE Access 8, 195763-195771, 2020 | 7 | 2020 |