Author of the publication

A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression.

, , , , and . Concurr. Comput. Pract. Exp., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical Investigation of Decision Tree Ensembles for Monitoring Cardiac Complications of Diabetes., , , and . IJDWM, 9 (4): 1-18 (2013)Neighbourhood-Pair Attack in Social Network Data Publishing., and . MobiQuitous, volume 131 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 726-731. Springer, (2013)Secure Object Tracking Protocol for the Internet of Things., , and . IEEE Internet of Things Journal, 3 (4): 544-553 (2016)An Efficient Replicated Data Management Approach for Peer-to-Peer Systems.. International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 457-463. Springer, (2005)A Survey of Big Workflow., , , and . DaEng, volume 520 of Lecture Notes in Electrical Engineering, page 529-539. Springer, (2015)Energy Efficient Multipath Routing Algorithm for Wireless Multimedia Sensor Network., , and . Sensors, 19 (17): 3642 (2019)Enhancing Big Social Media Data Quality for Use in Short-Text Topic Modeling., , , , , and . IEEE Access, (2022)FAEO-ECNN: cyberbullying detection in social media platforms using topic modelling and deep learning., , , , , and . Multim. Tools Appl., 82 (30): 46611-46650 (December 2023)Malware Threats and Detection for Industrial Mobile-IoT Networks., , , , and . IEEE Access, (2018)Scalable RFID security framework and protocol supporting Internet of Things., , and . Comput. Networks, (2014)