Author of the publication

Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification.

, , , and . J. Comput. Secur., 16 (6): 761-790 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting the design of privacy-aware business processes via privacy process patterns., , , and . RCIS, page 187-198. IEEE, (2017)Measuring Users' Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments., , , and . TrustBus, volume 12395 of Lecture Notes in Computer Science, page 140-155. Springer, (2020)Writer Identification Using a Statistical and Model Based Approach., , and . ICFHR, page 589-594. IEEE Computer Society, (2014)A framework for detecting malformed messages in SIP networks., , , , and . LANMAN, IEEE, (2005)The Civil Society as an Innovation Partner in Public Policy Making: Co-Creating the Greek National Action Plan on Open Government., and . MCIS, page 25. AISeL, (2018)Incorporating Security Requirements Into the Software Development Process., , , , , and . ECIW, page 21-28. Academic Conferences Limited, Reading, UK, (2005)Risk management for new information technology insertion in a shipping company., and . Operational Research, 1 (1): 7-16 (2001)Distributed component architectures security issues., , and . Comput. Stand. Interfaces, 27 (3): 269-284 (2005)What Do We Know About Our Rights to Data Protection? A Greek Case Study., , and . e-Democracy, volume 1111 of Communications in Computer and Information Science, page 18-33. Springer, (2019)Signaling-Oriented DoS Attacks in UMTS Networks., , , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 280-289. Springer, (2009)