Author of the publication

Fast and Effective Clustering of Spam Emails Based on Structural Similarity.

, , , , and . FPS, volume 9482 of Lecture Notes in Computer Science, page 195-211. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface., and . STM@IFIPTM, volume 244 of Electronic Notes in Theoretical Computer Science, page 1-2. Elsevier, (2008)Enforcement of U-XACML History-Based Usage Control Policy., , , and . STM, volume 9871 of Lecture Notes in Computer Science, page 64-81. Springer, (2016)Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market., , , and . CRiSIS, volume 10694 of Lecture Notes in Computer Science, page 159-174. Springer, (2017)Exploiting Vehicles' Reputation to Mitigate DoS Attack., , and . AMARETTO@MODELSWARD, page 75-82. SciTePress, (2016)Towards Continuous Usage Control on Grid Computational Services., , and . ICAS/ICNS, page 82. IEEE Computer Society, (2005)Improving Vehicle Safety Through a Fog Collaborative Infrastructure., , , and . SMARTCOMP, page 446-451. IEEE Computer Society, (2018)Optimal Security Configuration for Cyber Insurance., , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 187-200. Springer, (2018)Privacy-preserving mobility-casting in opportunistic networks., , and . PST, page 10-18. IEEE Computer Society, (2014)Privacy Preserving Random Decision Tree Classification Over Horizontally and Vertically Partitioned Data., , , and . DASC/PiCom/DataCom/CyberSciTech, page 600-607. IEEE Computer Society, (2018)Random lattice triangulations: structure and algorithms., , , and . STOC, page 615-624. ACM, (2013)