Author of the publication

Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector.

, , , , and . SOLI, page 1-7. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AEON: Android Encryption based Obfuscation., , , and . CODASPY, page 146-148. ACM, (2018)Data Analysis for Curriculum Alteration in Information Communication Technology., , and . TALE, page 513-518. IEEE, (2021)Anomaly Detection on DNS Traffic using Big Data and Machine Learning., , and . BDCSIntell, volume 2622 of CEUR Workshop Proceedings, page 95-104. CEUR-WS.org, (2019)Towards Robust Detection of PDF-based Malware., , , and . CODASPY, page 370-372. ACM, (2022)GRAMAC: A Graph Based Android Malware Classification Mechanism., , , and . CODASPY, page 156-158. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Blockchain-based Proof of Existence (PoE) Framework using Ethereum Smart Contracts., , , and . CODASPY, page 301-303. ACM, (2021)Quantum Obfuscation: Quantum Predicates with Entangled qubits.. CODASPY, page 293-295. ACM, (2021)Neutralizing Hostile Drones with Surveillance Drones., and . CODASPY, page 297-299. ACM, (2021)ASAP: Application Security Assessment Protocol., , , , and . SOLI, page 1-4. IEEE, (2023)Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector., , , , and . SOLI, page 1-7. IEEE, (2023)