Torank: Identifying the most influential suspicious domains in the tor network
The Tor network hosts a significant amount of hidden services related to suspicious
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …
A systematic mapping study of developer social network research
S Herbold, A Amirfallah, F Trautsch… - Journal of Systems and …, 2021 - Elsevier
Developer social networks (DSNs) are a tool for the analysis of community structures and
collaborations between developers in software projects and software ecosystems. Within …
collaborations between developers in software projects and software ecosystems. Within …
A framework of environmental, personal, and behavioral factors of adult learning in online communities of practice
Adult learning is a complex phenomenon that takes place over an adult's lifetime and is not
limited to a particular age. It includes a set of activities to enhance life through improving …
limited to a particular age. It includes a set of activities to enhance life through improving …
Community evolution on stack overflow
I Moutidis, HTP Williams - Plos one, 2021 - journals.plos.org
Question and answer (Q&A) websites are a medium where people can communicate and
help each other. Stack Overflow is one of the most popular Q&A websites about …
help each other. Stack Overflow is one of the most popular Q&A websites about …
Keeping pace with the digital age: Envisioning information systems research as a platform
In this paper, we respond to Grover and Lyytinen (2022). We agree with them that the advent
of the digital age is calling for a reconsideration of the role of theory and theorizing. We also …
of the digital age is calling for a reconsideration of the role of theory and theorizing. We also …
Hackerscope: The dynamics of a massive hacker online ecosystem
One would have thought that hackers would be striving to hide from public view, but we find
that this is not the case: they have a public online footprint. Apart from online security forums …
that this is not the case: they have a public online footprint. Apart from online security forums …
[HTML][HTML] Predicting long-time contributors for GitHub projects using machine learning
VK Eluri, TA Mazzuchi, S Sarkani - Information and Software Technology, 2021 - Elsevier
Context: Many organizations develop software systems using open source software (OSS),
which is risky due to the high possibility of losing support. Contributors are critical for the …
which is risky due to the high possibility of losing support. Contributors are critical for the …
Multiple userids identification with deep learning
People are becoming increasingly active on social media. It is common knowledge that most
users register more than one social media account. Some users use multiple accounts to …
users register more than one social media account. Some users use multiple accounts to …
Exploring the attributes of influential users in social networks using association rule mining
M Alghobiri - Social Network Analysis and Mining, 2023 - Springer
Association rule mining discovers interesting patterns and meaningful connections between
items or actions performed by users on social media platforms. These connections can …
items or actions performed by users on social media platforms. These connections can …
A collective portfolio selection approach for investment clubs
Recently, with the popularity of social investing platforms, participating in an investment club
has become a good choice for investors. Following financial experts in the investment club …
has become a good choice for investors. Following financial experts in the investment club …