Author of the publication

Compromised user credentials detection in a digital enterprise using behavioral analytics.

, , , , , , and . Future Gener. Comput. Syst., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Machine Learning and Metaheuristics Algorithms for Classification Method PROAFTN., , and . Enhanced Living Environments, volume 11369 of Lecture Notes in Computer Science, Springer, (2019)Stopword Detection for Streaming Content., , , , and . ECIR, volume 10772 of Lecture Notes in Computer Science, page 737-743. Springer, (2018)Discretization Techniques and Genetic Algorithm for Learning the Classification Method PROAFTN., , , and . ICMLA, page 685-688. IEEE Computer Society, (2009)Analyzing complex networks: Extracting key characteristics and measuring structural similarities., , , and . Expert Syst. J. Knowl. Eng., (January 2024)Correction to: Leveraging cloud computing for the semantic web: review and trends., , , , , and . Soft Comput., 24 (8): 6015 (2020)A Framework for Online Social Network Volatile Data Analysis: A Case for the Fast Fashion Industry., , , and . J. Univers. Comput. Sci., 26 (1): 127-155 (2020)Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert., , , , , , , and . IEEE Internet Things J., 7 (5): 4497-4504 (2020)A prudent based approach for compromised user credentials detection., , , , , and . Clust. Comput., 21 (1): 423-441 (2018)A Latent Model for Ad Hoc Table Retrieval., and . ECIR (2), volume 12036 of Lecture Notes in Computer Science, page 86-93. Springer, (2020)Fane-KG: A Semantic Knowledge Graph for Context-Based Fake News Detection on Social Media., , , , and . SNAMS, page 1-6. IEEE, (2020)