Mohammad Shafahi

  • Citations Per Year
Learn More
Text-based and semantics-based methods are both studied intensively as methods for document retrieval. In order to gain insight in the respective merits of these two approaches, we have performed a controlled experiment where we executed a real-life task using both textbased and semantics-based techniques. To maximise the lessons that we could draw about(More)
Complex service-enhanced products such as solar power plants and intelligent buildings are one-of-a-kind and highly customized by nature. As such on one hand the specification of their sub-products and services involve a wide variety of competitive/cooperative stakeholders and on the other hand through different stages of their long life cycle, these(More)
This work investigates how social bots can phish employees of organizations, and thus endanger corporate network security. Current literature mostly focuses on traditional phishing methods (through e-mail, phone calls, and USB sticks). We address the serious organizational threats and security risks caused by phishing through online social media,(More)
  • 1