Author of the publication

SoMIAP: Social Media Images Analysis and Prediction Framework.

, , , and . NEW2AN/ruSMART, volume 12525 of Lecture Notes in Computer Science, page 205-216. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Arguments For Anonymity., , and . HAISA, page 141-150. University of Plymouth, (2015)A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems., , and . ISSE, page 1-6. IEEE, (2019)Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging., , , , , , , and . SSCI, page 1138-1145. IEEE, (2020)Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering., , , and . FUZZ-IEEE, page 1-6. IEEE, (2019)A new approach for a better recovery of cluster head nodes in underwater sensor networks., , and . TEMU, page 167-172. IEEE, (2014)Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis., , and . SSCI, page 623-630. IEEE, (2018)A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning., , , and . SERVICES, page 177-182. IEEE, (2020)A Distributed Cloud Honeypot Architecture., , , and . COMPSAC, page 1176-1181. IEEE, (2021)BotSpot: Deep Learning Classification of Bot Accounts within Twitter., , , , and . CoRR, (2021)SoMIAP: Social media images analysis and prediction framework., , , and . CoRR, (2021)