Author of the publication

Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection.

, and . FUZZ-IEEE, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Neural Ranking for Crowdsourced Geopolitical Event Forecasting., , , and . MLN, volume 11407 of Lecture Notes in Computer Science, page 257-269. Springer, (2018)Propagation Models and Analysis for Mobile Phone Data Analytics, and . Propagation Phenomena in Real World Networks, volume 85 of Intelligent Systems Reference Library, Springer International Publishing, (2015)Teaching the Foundations of Data Science: An Interdisciplinary Approach., , and . CoRR, (2015)Architecture-based Reliability Analysis With Uncertain Parameters., , , and . SEKE, page 629-634. Knowledge Systems Institute Graduate School, (2011)Stay Awhile and Listen: User Interactions in a Crowdsourced Platform Offering Emotional Support., , , , , and . ASONAM, page 667-674. ACM, (2015)A comparison of web robot and human requests., , and . ASONAM, page 1374-1380. ACM, (2013)Discovering New Trends in Web Robot Traffic Through Functional Classification., and . NCA, page 275-278. IEEE Computer Society, (2008)Cost-Based Optimization of Buffer Size in M/G/1/N Systems under Different Service-Time Distributions., , and . NCA, page 28-35. IEEE Computer Society, (2010)Contextual Grounding of Natural Language Entities in Images., , , and . ViGIL@NeurIPS, (2019)A semantics-based measure of emoji similarity., , , and . WI, page 646-653. ACM, (2017)