From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Content analysis and modeling interactions in social engineering attacks.. Texas Tech University, Lubbock, USA, (2022)base-search.net (fttexastechuniv:oai:ttu-ir.tdl.org:2346/90243).Linguistic Features for Detecting Fake Reviews., , , , и . ICMLA, стр. 352-359. IEEE, (2020)Detecting Phishing URLs using the BERT Transformer Model., , , и . IEEE Big Data, стр. 2483-2492. IEEE, (2023)A Comparative Multivariate Analysis of VAR and Deep Learning-Based Models for Forecasting Volatile Time Series Data., , , и . IEEE Access, (2024)Abuse of the Cloud as an Attack Platform., , , , и . COMPSAC, стр. 1091-1092. IEEE, (2020)Using Transformers for Identification of Persuasion Principles in Phishing Emails., , , и . IEEE Big Data, стр. 2841-2848. IEEE, (2022)Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy?, , , , и . IEEE BigData, стр. 3252-3259. IEEE, (2019)Email Embeddings for Phishing Detection., , , , и . IEEE BigData, стр. 2087-2092. IEEE, (2020)Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data., , , и . COMPSAC, стр. 376-381. IEEE, (2024)A Comparison of TCN and LSTM Models in Detecting Anomalies in Time Series Data., , , и . IEEE BigData, стр. 2415-2420. IEEE, (2021)