Publications

Tsikerdekis, M. and S. Zeadally, “Misinformation detection using deep learning,” IT Professional, 2023. To appear. Impact Factor: 2.6

Li, R. and M. Tsikerdekis, “Hourly Network Anomaly Detection on HTTP using Exponential Random Graph Models and Autoregressive Moving Average,” Journal of Cybersecurity and Privacy, 2023. To appear.

Tsikerdekis, M., S. Waldron , and A. Emanuelson, “Network Anomaly Detection Using Exponential Random Graph Models and Autoregressive Moving Average,” IEEE Access, vol. 9, pp. 134 530–134 542, 2021, issn: 2169-3536. doi: 10.1109/ACCESS.2021.3116575. Impact Factor: 3.367

Tran, K., S. Keene, E. Fretheim, and M. Tsikerdekis, “Marine Network Protocols and Security Risks,” Journal of Cybersecurity and Privacy, vol. 1, no. 2, pp. 239–251, 2021, issn: 2624-800X. doi: 10.3390/jcp1020013. [Online]. Available: https://www.mdpi.com/2624-800X/1/2/13. Feature Article (for July 2021), Journal Front Page.

Tsikerdekis, M., S. Barret, ℝ. ℍansen, M. Klein, J. Orritt, and J. Whitmore, “Efficient Deep Learning Bot Detection in Games Using Time Windows and Long Short-Term Memory (LSTM),” IEEE Access, vol. 8, pp. 195 763–195 771, 2020, issn: 2169-3536. doi: 10.1109/ACCESS.2020.3033725. [Online]. Available: https://ieeexplore.ieee.org/document/9239256/. Impact Factor: 3.745

ℂarter, M., M. Tsikerdekis, and S. Zeadally, “Approaches for Fake Content Detection: Strengths and Weaknesses to Adversarial Attacks,” IEEE Internet Computing, pp. 1–1, 2020, issn: 1089-7801. doi: 10.1109/MIC.2020.3032323. [Online]. Available: https://ieeexplore.ieee.org/document/9233435/. Impact Factor: 4.231

Ismailov, M., M. Tsikerdekis, and S. Zeadally, “Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation,” Future Internet, 2020. Citescore: 2.8

Smith IV, D. ℍ., Q. Hao, V. Dennen, M. Tsikerdekis, B. Barnes, L. Martin, and N. Tresham, “Towards Understanding Online Question & Answer Interactions and their effects on student performance in large-scale STEM classes,” International Journal of Educational Technology in Higher Education, vol. 17, no. 1, p. 20, 2020, issn: 2365-9440. doi: 10.1186/s41239-020-00200-7. [Online]. Available: https://educationaltechnologyjournal.springeropen.com/articles/10.1186/s41239-020-00200-7. Impact Factor: 1.922

Tsikerdekis, M. and S. Zeadally, “Detecting Online Content Deception,” IT Professional, vol. 22, no. 2, pp. 35–44, 2020, issn: 1520-9202. doi: 10.1109/MITP.2019.2961638. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1109.MITP.2019.2961638.pdf. Impact Factor: 2.424

Zeadally, S. and M. Tsikerdekis, “Securing Internet of Things (IoT) with machine learning,” International Journal of Communication Systems, vol. 33, no. 1, e4169, 2020, issn: 10745351. doi: 10.1002/dac.4169. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1002.dac.4169.pdf. Impact Factor: 1.278. Top 10% downloaded papers among works published between January 2018 and December 2019.

Hao, Q. and M. Tsikerdekis, “How Automated Feedback is Delivered Matters: Formative Feedback and Knowledge Transfer,” in 2019 IEEE Frontiers in Education Conference (FIE), Cincinatti OH: IEEE, 2019, pp. 1–6, isbn: 978-1-7281-1746-1. doi: 10.1109/FIE43999.2019.9028686. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1109.FIE43999.2019.9028686.pdf

Hao, Q., D. ℍ. Smith IV, ℕ. Iriumi, M. Tsikerdekis, and A. J. Ko, “A Systematic Investigation of Replications in Computing Education Research,” ACM Transactions on Computing Education, vol. 19, no. 4, pp. 1–18, 2019, issn: 19466226. doi: 10.1145/3345328. [Online]. Available: http://dl.acm.org/citation.cfm?doid=3345033.3345328. RG Journal Impact: 1.67

Tsikerdekis, M., T. Morse, ℂ. Dean, and J. ℝuffin, “A taxonomy of features for preventing identity deception in online communities and their estimated efficacy,” Journal of Information Security and Applications, vol. 47, pp. 363–370, 2019, issn: 22142126. doi: 10.1016/j.jisa.2019.06.002. [Online]. Available: https://linkinghub.elsevier.com/retrieve/pii/S2214212619300778. Impact Factor: 3.17

Tsikerdekis, M., S. Zeadally, A. Schlesener, and N. Sklavos, “Approaches for Preventing Honeypot Detection and Compromise,” in 2018 Global Information Infrastructure and Networking Symposium, GIIS 2018, Thessaloniki, Greece: IEEE, 2019, pp. 1–6, isbn: 9781538672723. doi: 10.1109/GIIS.2018.8635603. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1109.GIIS.2018.8635603.pdf

ℍeller, L. and M. Tsikerdekis, “Selective Equation Constructor: A Scalable Genetic Algorithm,” in 2018 IEEE (SMC) International Conference on Innovations in Intelligent Systems and Applications, INISTA 2018, 2018, pp. 1–10, isbn: 9781538651506. doi: 10.1109/INISTA.2018.8466278. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1109.INISTA.2018.8466278.pdf

Tsikerdekis, M., “Persistent code contribution: a ranking algorithm for code contribution in crowdsourced software,” Empirical Software Engineering, vol. 23, no. 4, pp. 1871–1894, 2018, issn: 15737616. doi: 10.1007/s10664-017-9575-4. [Online]. Available: http://rdcu.be/y0I9. Impact Factor: 3.275

Tsikerdekis, M. and N. Yu, “Unit Support, Past Experience and Researcher Attitude for Intra-institutional Research Collaboration: Survey Study in a US Doctoral/Research University,” Higher Education Policy, vol. 31, no. 4, pp. 559–581, 2018, issn: 17403863. doi: 10.1057/s41307-017-0071-7. [Online]. Available: http://rdcu.be/xZ8Y. Impact Factor: 0.727

Tsikerdekis, M., “Real-Time Identity-Deception Detection Techniques for Social Media: Optimizations and Challenges,” IEEE Internet Computing, vol. 22, no. 5, pp. 35–45, 2018, issn: 19410131. doi: 10.1109/MIC.2017.265102442. [Online]. Available: http://michael.tsikerdekis.com/downloads/10.1109.MIC.2017.265102442.pdf. Impact Factor: 1.4

Tsikerdekis, M., “Cumulative experience and recent behavior and their relation to content quality on Wikipedia,” Interacting with Computers, vol. 29, no. 5, pp. 737–754, 2017, issn: 09535438. doi: 10.1093/iwc/iwx010. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1093.iwc.iwx010.pdf. Impact Factor: 1.410

Tsikerdekis, M., “Identity Deception Prevention Using Common Contribution Network Data,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 1, pp. 188–199, 2017, issn: 15566013. doi: 10.1109/TIFS.2016.2607697. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1109.TIFS.2016.2607697.pdf. Impact Factor: 2.441

Nemer, D. and M. Tsikerdekis, “Political engagement and ICTs: Internet use in marginalized communities,” Journal of the Association for Information Science and Technology, vol. 68, no. 6, pp. 1539–1550, 2017, issn: 23301643. doi: 10.1002/asi.23779. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1002.asi.23779.pdf. Impact Factor: 1.850

Tsikerdekis, M., “Designing a successful collaborative Wiki: The choice between outcome quality and online community needs,” International Journal of Technology and Human Interaction, vol. 13, no. 2, pp. 22–39, 2017, issn: 15483916. doi: 10.4018/IJTHI.2017040102. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.4018.IJTHI.2017040102.pdf. RG Impact Factor: 0.67

Tsikerdekis, M., “Bayesian Inference,” in Modern Statistical Methods for HCI, Robertson, J. and M. C. Kaptein, Eds., London, U.K.: Springer, 2016, ch. 7, pp. 173–197, isbn: 978-3-319-26631-2. doi: 10.1007/978-3-319-26633-6. arXiv: arXiv:1011.1669v3. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1007.978-3-319-26633-6.pdf

Tsikerdekis, M., “Personal communication networks and their positive effects on online collaboration and outcome quality on Wikipedia,” Journal of the Association for Information Science and Technology, vol. 67, no. 4, pp. 812–823, 2016, issn: 23301643. doi: 10.1002/asi.23429. [Online]. Available: http://michael.tsikerdekis.com/downloads/10.1002.asi.23429.pdf. Impact Factor: 2.23

Tsikerdekis, M. and S. Zeadally, “Detecting and Preventing Online Identity Deception in Social Networking Services,” IEEE Internet Computing, vol. 19, no. 3, pp. 41–49, 2015, issn: 10897801. doi: 10.1109/MIC.2015.21. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1109.MIC.2015.21.pdf. Impact Factor: 2.0. (Selected as the Feature Article (for July 2015) by IEEE Computer Society Special Technical Committee on Social Networking.)

Truta, T. M., M. Tsikerdekis, and S. Zeadally, “Privacy in Social Networks,” in Privacy in a Digital, Networked World, Zeadally, S. and M. Badra, Eds., London, U.K.: Springer, 2015, pp. 263–289. doi: 10.1007/978-3-319-08470-1_12. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1007.978-3-319-08470-1{\_}12.pdf.

Tsikerdekis, M. and S. Zeadally, “Online deception in social media,” Communications of the ACM, vol. 57, no. 9, pp. 72–80, 2014, issn: 00010782. doi: 10.1145/2629612. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1145.2629612.pdf. Impact Factor: 2.863

Tsikerdekis, M. and S. Zeadally, “Multiple account identity deception detection in social media using nonverbal behavior,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 8, pp. 1311–1321, 2014, issn: 15566013. doi: 10.1109/TIFS.2014.2332820. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1109.TIFS.2014.2332820.pdf. Impact Factor: 2.065

Tsikerdekis, M., “The effects of perceived anonymity and anonymity states on conformity and groupthink in online communities: A Wikipedia study,” Journal of the American Society for Information Science and Technology, vol. 64, no. 5, pp. 1001–1015, 2013, issn: 15322882. doi: 10.1002/asi.22795. arXiv: 0803.1716. [Online]. Available: https://michael.tsikerdekis.com/downloads/10.1002.asi.22795.pdf. Impact Factor: 2.081

Tsikerdekis, M., “Dynamic voting interface in social media: Does it affect individual votes?” In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Boas, P. v. E., F. C. A. Groen, G. F. Italiano, J. Nawrocki, and H. Sack, Eds., vol. 7741 LNCS, Springer Berlin Heidelberg, 2013, pp. 552–563, isbn: 9783642358425. doi: 10.1007/978-3-642-35843-2_47. Rank: B (CORE2014) [link]

Tsikerdekis, M., “Pro/Con Lists and their Use in Group Decision Support Systems for Reducing Groupthink,” INFOCOMP Journal of Computer Science, vol. 11, no. 2, pp. 10–20, 2012, issn: 1807-4545. [Online]. Available: http://www.dcc.ufla.br/infocomp/index.php/INFOCOMP/article/view/352/336.

Tsikerdekis, M., “The choice of complete anonymity versus pseudonymity for aggression online.,” eMinds International Journal on HumanComputer Interaction, vol. 2, no. 8, pp. 35–57, 2012, issn: 9728939523

Tsikerdekis, M., “Engineering anonymity to reduce aggression online,” in Proceedings of the IADIS International Conference Interfaces and Human Computer Interaction 2011, Part of the IADIS Multi Conference on Computer Science and Information Systems 2011, MCCSIS 2011, Blashki, K., Ed., IADIS, 2011, pp. 463–467, isbn: 9789728939526.

Note: Impact factors, h5-index, acceptance rates are taken at the time when manuscripts were submitted for review.