Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Term Weighting: Novel Fuzzy Logic based Method Vs. Classical TF-IDF Method for Web Information Extraction., , , and . ICEIS (2), page 130-137. (2009)A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot., , , , and . QRS Companion, page 633-634. IEEE, (2018)A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices., , , , and . Entropy, 21 (12): 1136 (2019)Improving Classification Algorithms by Considering Score Series in Wireless Acoustic Sensor Networks., , , and . Sensors, 18 (8): 2465 (2018)Visualizing Classification Results: Confusion Star and Confusion Gear., , , and . IEEE Access, (2022)Model of Knowledge Spreading for Multi-agent Systems., , , , , and . ICEIS (2), page 326-331. SciTePress, (2010)Planning Security Policy on E-Commerce., , , and . ICEIS (2), page 915-919. (2001)Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems., , , , and . ICEIS, volume 24 of Lecture Notes in Business Information Processing, page 737-744. Springer, (2009)Exploiting the Symmetry of Integral Transforms for Featuring Anuran Calls., , , and . Symmetry, 11 (3): 405 (2019)Information Systems for Improving Competition in Deregulated Electricity Market., , and . ICEIS, page 402-406. (2000)