Author of the publication

Identifying malicious web domains using machine learning techniques with online credibility and performance data.

, , , , and . CEC, page 5186-5194. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Co-evolution of agent strategies in N-player dilemmas., and . AAMAS, page 1591-1592. IFAAMAS, (2010)Using Deep Learning and 360 Video to Detect Eating Behavior for User Assistance Systems., , , and . ECIS, page 101. (2018)Supply Chain Coordination with a Risk-Averse Retailer and a Combined Buy-Back and Revenue Sharing Contract., , , , , and . Asia Pac. J. Oper. Res., 36 (5): 1950028:1-1950028:23 (2019)A hybrid artificial bee colony algorithm for flexible job shop scheduling with worker flexibility., , , and . Int. J. Prod. Res., 58 (14): 4406-4420 (2020)Evolutionary Approaches and their Applications to Distributed Systems, and . Intelligent Systems for Automated Learning and Adaptation: Emerging Trends and Applications, chapter 6, Information Science Reference: Hershey, PA, USA, (2009)A Comparison between Genetic Algorithms and Evolutionary Programming based on Cutting Stock Problem., and . IMECS, page 645-650. Newswood Limited, (2006)Malicious Web Domain Identification using Online Credibility and Performance Data by Considering the Class Imbalance Issue., , , , and . CoRR, (2018)Critical Factors Influencing the Intention to Adopt m-Government Services by the Elderly., , , and . J. Glob. Inf. Manag., 28 (4): 74-94 (2020)Suboptimal business intelligence implementations: understanding and addressing the problems., , , and . J. Syst. Inf. Technol., 17 (3): 307-320 (2015)Imitation vs evolution: Analysing the effects of strategy update mechanisms in N-player social dilemmas., and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2010)