Igor Mishkovski

Orcid: 0000-0003-1137-6102

According to our database1, Igor Mishkovski authored at least 30 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Comparative Analysis of NLP-Based Models for Company Classification.
Inf., February, 2024

2023
Company classification using zero-shot learning.
CoRR, 2023

Extracting Entities and Relations in Analyst Stock Ratings News.
Proceedings of the ICT Innovations 2023. Learning: Humans, Theory, Machines, and Data, 2023

2019
Friendship Paradox and Hashtag Embedding in the Instagram Social Network.
Proceedings of the ICT Innovations 2019. Big Data Processing and Mining, 2019

Performance Evaluation of Word and Sentence Embeddings for Finance Headlines Sentiment Analysis.
Proceedings of the ICT Innovations 2019. Big Data Processing and Mining, 2019

2018
Linked Data Authorization Platform.
IEEE Access, 2018

Epidemic spreading in multiplex networks with Markov and memory based inter-layer dynamics.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

2017
Interplay Between Spreading and Random Walk Processes in Multiplex Networks.
IEEE Trans. Circuits Syst. I Regul. Pap., 2017

Semantic homophily in online communication: Evidence from Twitter.
Online Soc. Networks Media, 2017

Malware distributions and graph structure of the Web.
CoRR, 2017

2016
Interplay of homophily and communication in online social networks: Wikipedia-based semantic metric application on Twitter.
CoRR, 2016

The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

Correlating file-based malware graphs against the empirical ground truth of DNS graphs.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

2015
Accelerating Wireless Network Simulation in 3D Terrain Using GPUS.
Ad Hoc Sens. Wirel. Networks, 2015

2014
Synchronization and Consensus in State-Dependent Networks.
IEEE Trans. Circuits Syst. I Regul. Pap., 2014

2013
Hierarchy and Vulnerability of Complex Networks.
Proceedings of the ICT Innovations 2013, 2013

2012
Vulnerability and dynamical processes in complex networks.
PhD thesis, 2012

Synchronization analysis of networks of identical and nearly identical Chua's oscillators.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

P2P Assisted Streaming for Low Popularity VoD Contents.
Proceedings of the ICT Innovations 2012, 2012

2011
Chaos-Based Public-Key Cryptography.
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011

Apportionment Heuristics for Mapping Tasks in Heterogeneous Computing Systems.
Proceedings of the ICT Innovations 2011, Skopje, Macedonia, 14-16 September, 2011, 2011

Effects of Terrain Details on Wireless Network Simulation Macro Results Accuracy.
Proceedings of the ICT Innovations 2011, Skopje, Macedonia, 14-16 September, 2011, 2011

2010
Building synchronizable and robust networks.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Selective Attack in Virus Propagation Processes.
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010

Accelerating Clustering Coefficient Calculations on a GPU Using OPENCL.
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010

Organizations Analysis with Complex Network Theory.
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010

2009
Vulnerability Assessment of Complex Networks Based on Optimal Flow Measurements under Intentional Node and Edge Attacks.
Proceedings of the ICT Innovations 2009, Ohrid, Macedonia, 28-30 September, 2009, 2009

2008
Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

2007
Grid Computing Implementation in Ad Hoc Networks.
Proceedings of the Advances in Computer and Information Sciences and Engineering, 2007


  Loading...