Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
A Profile-Based Method for Authorship Verification
- Nektaria Potha, E. Stamatatos
- Computer Science
- SETN
- 15 May 2014
TLDR
An Improved Impostors Method for Authorship Verification
- Nektaria Potha, E. Stamatatos
- Computer Science
- CLEF
- 11 September 2017
TLDR
Intrinsic Author Verification Using Topic Modeling
- Nektaria Potha, E. Stamatatos
- Computer Science
- SETN
- 9 July 2018
TLDR
Cyberbullying Detection using Time Series Modeling
- Nektaria Potha, M. Maragoudakis
- Computer Science
- IEEE International Conference on Data Mining…
- 1 December 2014
TLDR
Dynamic Ensemble Selection for Author Verification
- Nektaria Potha, E. Stamatatos
- Computer Science
- ECIR
- 14 April 2019
TLDR
Two Anatomists Are Better than One - Dual-Level Android Malware Detection
- Vasileios Kouliaridis, G. Kambourakis, D. Geneiatakis, Nektaria Potha
- Computer Science
- Symmetry
- 7 July 2020
TLDR
Time Series Forecasting in Cyberbullying Data
- Nektaria Potha, M. Maragoudakis
- Computer Science
- EANN
- 25 September 2015
TLDR
A biology-inspired, data mining framework for extracting patterns in sexual cyberbullying data
- Nektaria Potha, M. Maragoudakis, Dimitrios P. Lyras
- Computer Science
- Knowl. Based Syst.
- 15 March 2016
TLDR
Improved algorithms for extrinsic author verification
- Nektaria Potha, E. Stamatatos
- Computer Science
- Knowledge and Information Systems
- 8 October 2019
TLDR
Improving author verification based on topic modeling
- Nektaria Potha, E. Stamatatos
- Computer Science
- J. Assoc. Inf. Sci. Technol.
- 1 October 2019
TLDR