From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Learning Approaches for Modeling Spammer Behavior., , и . AIRS, том 6458 из Lecture Notes in Computer Science, стр. 251-260. Springer, (2010)Child Abuse and Domestic Abuse: Content and Feature Analysis from Social Media Disclosures., , , , и . ADC, том 10837 из Lecture Notes in Computer Science, стр. 174-185. Springer, (2018)The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems., , , , и . Sensors, 23 (2): 758 (января 2023)Chemical reaction optimization: survey on variants., , и . Evol. Intell., 12 (3): 395-420 (2019)A hybrid metaheuristic method for solving resource constrained project scheduling problem., , и . Evol. Intell., 16 (2): 519-537 (апреля 2023)UCBVis: Understanding Customer Behavior Sequences with Visual Interactive System., , , , и . IJCNN, стр. 1-8. IEEE, (2021)Hybrids of support vector machine wrapper and filter based framework for malware detection., , , , , и . Future Gener. Comput. Syst., (2016)A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy., , , , , и . Concurr. Comput. Pract. Exp., (2017)A Systematic Literature Review of Cloud Brokers for Autonomic Service Distribution., , и . IEEE Access, (2024)How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond., , , , , и . IEEE Access, (2022)