Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved rule induction based denial of service attacks classification model., , , and . Comput. Secur., (2020)Heuristic evaluation of mobile government portal services: An experts' review., and . ICITST, page 427-431. IEEE, (2016)Search Convenience and Access Convenience: The Difference Between Website Shopping and Mobile Shopping., , , , , , , , and . SoCPaR, volume 942 of Advances in Intelligent Systems and Computing, page 33-42. Springer, (2018)Hybrid topic modeling method based on dirichlet multinomial mixture and fuzzy match algorithm for short text clustering., , , , , , , , and . J. Big Data, 11 (1): 68 (December 2024)Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks., , , , and . Int. J. Commun. Networks Inf. Secur., (2021)The effect of elite pool in hybrid population-based meta-heuristics for solving combinatorial optimization problems., , and . Appl. Soft Comput., (2016)How perceived justice affects total user satisfaction: applying service recovery perspective.. Electron. Gov. an Int. J., 17 (3): 354-373 (2021)The effect of perceived trust in technology, trust in the bank and perceived risk on customer adoption of mobile banking., , , , and . IINTEC, page 118-123. IEEE, (2019)Heuristic evaluation of distance learning management system interface., , and . ICEEI, page 1-6. IEEE, (2011)