Author of the publication

Enhancing email classification using data reduction and disagreement-based semi-supervised learning.

, , and . ICC, page 622-627. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IDS False Alarm Filtering Using KNN Classifier., and . WISA, volume 3325 of Lecture Notes in Computer Science, page 114-121. Springer, (2004)Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection., , and . ISMIS, volume 7661 of Lecture Notes in Computer Science, page 115-124. Springer, (2012)Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions., , and . IEEE Commun. Surv. Tutorials, 24 (1): 280-305 (2022)A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures., , and . J. Netw. Comput. Appl., (2016)Hypertext information security model for organizations.. Inf. Manag. Comput. Secur., 5 (4): 138-148 (1997)A security officer's workbench., and . Comput. Secur., 15 (8): 695-705 (1996)Security Documentation., , and . Conference on Information Security Management & Small Systems Security, volume 200 of IFIP Conference Proceedings, page 127-140. Kluwer, (2001)New Metrics for Automated Programming Assessment., , and . Software Engineering Education, volume A-40 of IFIP Transactions, page 233-243. North-Holland, (1993)Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection., and . Int. J. Comput. Intell. Syst., 6 (4): 626-638 (2013)Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones., , and . SAC, page 1680-1687. ACM, (2014)