Author of the publication

Detection of unknown malicious script code using a conceptual graph and SVM.

, , , , and . RACS, page 310-315. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correcting Misspelled Words in Twitter Text., , , and . BDTA, volume 194 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 83-90. Springer, (2016)A Design of Web Log Integration Framework Using NoSQL., , , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 438-445. Springer, (2014)Quantization of Colors Using Median of Pixels for Color Correlogram., , and . Edutainment, volume 4469 of Lecture Notes in Computer Science, page 723-729. Springer, (2007)Topic Selection of Web Documents Using Specific Domain Ontology., , , , and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 1047-1056. Springer, (2006)Energy efficient program updating for sensor nodes with flash memory., , , , and . SAC, page 194-200. ACM, (2010)A Deep Bidirectional GRU Network Model for Biometric Electrocardiogram Classification Based on Recurrent Neural Networks., , and . IEEE Access, (2019)Kansei Processing Agent for Personalizing Retrieval., , and . User Modeling, volume 4511 of Lecture Notes in Computer Science, page 390-394. Springer, (2007)Representing the Spatial Relations in the Semantic Web Ontologies., , , , , and . Australian Conference on Artificial Intelligence, volume 2903 of Lecture Notes in Computer Science, page 77-87. Springer, (2003)Design of inference rules for plant growth based on ontology., , and . RACS, page 92-95. ACM, (2015)Semantic Context Extraction from Wikipedia Document., , and . SWWS, page 38-41. CSREA Press, (2010)