Author of the publication

A Personalized Whitelist Approach for Phishing Webpage Detection.

, , and . ARES, page 249-254. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving boosting., , and . Data Min. Knowl. Discov., 14 (1): 131-170 (2007)Preserving Learners' Privacy., and . Advances in Intelligent Tutoring Systems, 308, (2010)A Stable Personalised Partner Selection for Collaborative Privacy Education., , and . UMAP (Adjunct Publication), page 47-52. ACM, (2020)Generative Adversarial Networks for Mitigating Biases in Machine Learning Systems., , and . CoRR, (2019)E-Payment Plan: A Conditional Multi-payment Scheme Based on User Personalization and Plan Agreement., , and . MCETECH, volume 289 of Lecture Notes in Business Information Processing, page 285-299. (2017)Me, Myself and I: Are Looking for a Balance between Personalization and Privacy., and . UMAP (Adjunct Publication), page 115-119. ACM, (2018)A Virtual Assistant for Web-Based Training in Engineering Education., , and . Intelligent Tutoring Systems, volume 2363 of Lecture Notes in Computer Science, page 301-310. Springer, (2002)LANCA: A Distance Learning Architecture Based on Networked Cognitive Agents., , , and . Intelligent Tutoring Systems, volume 1452 of Lecture Notes in Computer Science, page 593-603. Springer, (1998)Data Mining and Privacy.. Encyclopedia of Data Warehousing and Mining, IGI Global, (2009)Aegis: An Agent for Multi-party Privacy Preservation., , and . AIES, page 68-77. ACM, (2022)