Author of the publication

Distributed Phishing Detection by Applying Variable Selection Using Bayesian Additive Regression Trees.

, , , and . ICC, page 1-5. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Privacy Requirements into Security Requirements Engineering., , and . SEKE, page 542-547. Knowledge Systems Institute Graduate School, (2009)Bypassing Security Toolbars and Phishing Filters via DNS Poisoning., and . GLOBECOM, page 2001-2006. IEEE, (2008)Lessons from Stuxnet., and . Computer, 44 (4): 91-93 (2011)Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy., , , and . ARES, page 1044-1051. IEEE Computer Society, (2008)Privacy Risk Assessment in Privacy Requirements Engineering., and . RELAW, page 17-18. IEEE Computer Society, (2009)Distributed Phishing Detection by Applying Variable Selection Using Bayesian Additive Regression Trees., , , and . ICC, page 1-5. IEEE, (2009)Combining Privacy and Security Risk Assessment in Security Quality Requirements Engineering., and . AAAI Spring Symposium: Intelligent Information Privacy Management, AAAI, (2010)Three-Factor Authentication.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling., , and . AICCSA, page 151-158. IEEE Computer Society, (2006)A comparison of machine learning techniques for phishing detection., , , and . eCrime Researchers Summit, volume 269 of ACM International Conference Proceeding Series, page 60-69. ACM, (2007)