Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Planning Security Policy on E-Commerce., , , and . ICEIS (2), page 915-919. (2001)Term Weighting: Novel Fuzzy Logic based Method Vs. Classical TF-IDF Method for Web Information Extraction., , , and . ICEIS (2), page 130-137. (2009)A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices., , , , and . Entropy, 21 (12): 1136 (2019)Improving Classification Algorithms by Considering Score Series in Wireless Acoustic Sensor Networks., , , and . Sensors, 18 (8): 2465 (2018)A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot., , , , and . QRS Companion, page 633-634. IEEE, (2018)Visualizing Classification Results: Confusion Star and Confusion Gear., , , and . IEEE Access, (2022)Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems., , , , and . ICEIS, volume 24 of Lecture Notes in Business Information Processing, page 737-744. Springer, (2009)Model of Knowledge Spreading for Multi-agent Systems., , , , , and . ICEIS (2), page 326-331. SciTePress, (2010)A Fuzzy Logic intelligent agent for Information Extraction: Introducing a new Fuzzy Logic-based term weighting scheme., , , and . Expert Syst. Appl., 39 (4): 4567-4581 (2012)Information Systems for Improving Competition in Deregulated Electricity Market., , and . ICEIS, page 402-406. (2000)