Michail Tsikerdekis
YOU?
Author Swipe
View article: Spatial downscaling of CAMS surface pollutants using Machine Learning
Spatial downscaling of CAMS surface pollutants using Machine Learning Open
In order to monitor regional pollution over Europe, the Copernicus Atmosphere Monitoring Service (CAMS) coordinated by the European Centre for Medium-Range Weather Forecasts (ECMWF) implemented an operational multi-model air quality foreca…
View article: Hourly Network Anomaly Detection on HTTP Using Exponential Random Graph Models and Autoregressive Moving Average
Hourly Network Anomaly Detection on HTTP Using Exponential Random Graph Models and Autoregressive Moving Average Open
Network anomaly detection solutions can analyze a network’s data volume by protocol over time and can detect many kinds of cyberattacks such as exfiltration. We use exponential random graph models (ERGMs) in order to flatten hourly network…
View article: Marine Network Protocols and Security Risks
Marine Network Protocols and Security Risks Open
Marine network protocols are domain-specific network protocols that aim to incorporate particular features within the specialized marine context that devices are implemented in. Devices implemented in such vessels involve critical equipmen…
View article: Network Anomaly Detection Using Exponential Random Graph Models and Autoregressive Moving Average
Network Anomaly Detection Using Exponential Random Graph Models and Autoregressive Moving Average Open
Network anomaly detection solutions are being used as defense against several attacks, especially those related to data exfiltration. Several methods exist in the literature, such as clustering or neural networks. However, these methods of…
View article: Approaches for Fake Content Detection: Strengths and Weaknesses to Adversarial Attacks
Approaches for Fake Content Detection: Strengths and Weaknesses to Adversarial Attacks Open
In the last few years, we have witnessed an explosive growth of fake content on the Internet which has significantly affected the veracity of information on many social platforms. Much of this disruption has been caused by the proliferatio…
View article: Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation
Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation Open
Identity deception in online social networks is a pervasive problem. Ongoing research is developing methods for identity deception detection. However, the real-world efficacy of these methods is currently unknown because they have been eva…
View article: Towards Understanding Online Question & Answer Interactions and their effects on student performance in large-scale STEM classes
Towards Understanding Online Question & Answer Interactions and their effects on student performance in large-scale STEM classes Open
Online question & answer (Q & A) is a distinctive type of online interaction that is impactful on student learning. Prior studies on online interaction in large-scale classes mainly focused on online discussion and were conducted mainly in…
View article: Efficient Deep Learning Bot Detection in Games Using Time Windows and Long Short-Term Memory (LSTM)
Efficient Deep Learning Bot Detection in Games Using Time Windows and Long Short-Term Memory (LSTM) Open
Bots in video games has been gaining the interest of industry as well as academia as a problem that has been enabled by the recent advances in deep learning and reinforcement learning. In turn several studies have attempted to establish bo…
View article: A Systematic Investigation of Replications in Computing Education Research
A Systematic Investigation of Replications in Computing Education Research Open
As the societal demands for application and knowledge in computer science (CS) increase, CS student enrollment keeps growing rapidly around the world. By continuously improving the efficacy of computing education and providing guidelines f…
View article: A taxonomy of features for preventing identity deception in online communities and their estimated efficacy
A taxonomy of features for preventing identity deception in online communities and their estimated efficacy Open
Malicious attackers have been prevalent in online communities with the ability to create accounts freely and with ease on social platforms. This negatively impacts sub-communities on these platforms that often require trusted members espec…