From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating authorship distance methods using the positive Silhouette coefficient., , и . Nat. Lang. Eng., 19 (4): 517-535 (2013)REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery., , , , и . AI Commun., 29 (1): 107-122 (2015)Unsupervised authorship analysis of phishing webpages., , и . ISCIT, стр. 1104-1109. IEEE, (2012)A Simple Local n-gram Ensemble for Authorship Verification.. CLEF (Working Notes), том 1180 из CEUR Workshop Proceedings, стр. 1073-1078. CEUR-WS.org, (2014)Using Stereotypes to Improve Early-Match Poker Play., , и . Australasian Conference on Artificial Intelligence, том 5360 из Lecture Notes in Computer Science, стр. 584-593. Springer, (2008)Indirect Information Linkage for OSINT through Authorship Analysis of Aliases., , , , и . PAKDD Workshops, том 7867 из Lecture Notes in Computer Science, стр. 36-46. Springer, (2013)REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery., , , , и . AI Commun., 29 (1): 107-122 (2016)Automatically determining phishing campaigns using the USCAP methodology., , и . eCrime, стр. 1-8. IEEE, (2010)Determining provenance in phishing websites using automated conceptual analysis., и . eCrime, стр. 1-7. IEEE, (2009)A methodology for estimating the tangible cost of data breaches., и . J. Inf. Secur. Appl., 19 (6): 321-330 (2014)