Author of the publication

Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes.

, , , , , , , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 221-233. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Named Entity Recognition in Cyber Threat Intelligence Using Transformer-based Models., , , , , , and . CSR, page 348-353. IEEE, (2021)Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes., , , , , , , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 221-233. Springer, (2016)Towards a framework for detecting advanced Web bots., , , , , and . ARES, page 18:1-18:10. ACM, (2019)Adaptive Focused Crawling Using Online Learning - A Study on Content Related to Islamic Extremism., , , , and . INSCI, volume 11193 of Lecture Notes in Computer Science, page 40-53. Springer, (2018)Web Bot Detection Evasion Using Generative Adversarial Networks., , , , , and . CSR, page 115-120. IEEE, (2021)Towards Selecting Informative Content for Cyber Threat Intelligence., , , , , , and . CSR, page 354-359. IEEE, (2021)Web Bot Detection Evasion Using Deep Reinforcement Learning., , , , , and . ARES, page 15:1-15:10. ACM, (2022)Cyber Security Certification Programmes., , , , , , , , , and 9 other author(s). CSR, page 428-435. IEEE, (2021)Host-based Cyber Attack Pattern Identification on Honeypot Logs Using Association Rule Learning., , , , , and . CSR, page 50-55. IEEE, (2022)Towards Continuous Enrichment of Cyber Threat Intelligence: A Study on a Honeypot Dataset., , , , , , , , and . CSR, page 267-272. IEEE, (2022)