Author of the publication

Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach.

, , , and . ICCAE, page 104-110. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Moving Vehicle Speed Estimation Using Blob Analysis., , , , , , and . WorldCIST (2), volume 931 of Advances in Intelligent Systems and Computing, page 303-314. Springer, (2019)Government Size, Product Diversity and International Trade. Journal of Policy Modeling, 20 (1): 1--9 (February 1998)Provision of public infrastructure, foreign investment and welfare in the presence of specialisation-based external economies. Economic Modelling, 23 (1): 142--156 (January 2006)Bidding behavior in competing auctions: Evidence from eBay, , and . European Economic Review, 50 (2): 307--322 (February 2006)Factor mobility and wage inequality in the presence of specialisation-based external economies. Economics Letters, 93 (1): 88--93 (October 2006)Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach., , , and . ICCAE, page 104-110. ACM, (2017)Compact Deep Convolutional Neural Networks With Coarse Pruning., and . CoRR, (2016)Efficient motion estimation using two-bit transform and modified multilevel successive elimination., , , , and . J. Ambient Intell. Humaniz. Comput., 10 (10): 3947-3953 (2019)Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models., , , , , , and . Expert Syst. J. Knowl. Eng., (2021)COVID-19 Patient Count Prediction Using LSTM., , , , , , , and . IEEE Trans. Comput. Soc. Syst., 8 (4): 974-981 (2021)