From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , и . ACM Trans. Cyber Phys. Syst., 3 (4): 36:1-36:21 (2019)SAM: Multi-turn Response Selection Based on Semantic Awareness Matching., , , , , и . ACM Trans. Internet Techn., 23 (1): 3:1-3:18 (2023)Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity., , , , , , и . CoRR, (2020)Detecting spamming activities in twitter based on deep-learning technique., , , , , , и . Concurr. Comput. Pract. Exp., (2017)Every word is valuable: Studied influence of negative words that spread during election period in social media., , , , , и . Concurr. Comput. Pract. Exp., (2019)How Does Visualisation Help App Practitioners Analyse Android Apps?, , , , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (3): 2238-2255 (мая 2023)Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , и . CoRR, (2018)Twitter spam detection based on deep learning., , , и . ACSW, стр. 3:1-3:8. ACM, (2017)A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection., , , , , и . CoRR, (2024)RAIDER: Reinforcement-Aided Spear Phishing Detector., , , , , , , и . NSS, том 13787 из Lecture Notes in Computer Science, стр. 23-50. Springer, (2022)