Author of the publication

Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour.

, , , , , and . CISIS/ICEUTE/SOCO Special Sessions, volume 189 of Advances in Intelligent Systems and Computing, page 261-270. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on the effectiveness of anomaly detection for spam filtering., , , , , and . Inf. Sci., (2014)Word sense disambiguation for spam filtering., , , , and . Electron. Commer. Res. Appl., 11 (3): 290-298 (2012)Spam Filtering through Anomaly Detection., , , , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 203-216. Springer, (2011)Collective Classification for Spam Filtering., , , , and . CISIS, volume 6694 of Lecture Notes in Computer Science, page 1-8. Springer, (2011)Instance-based Anomaly Method for Android Malware Detection., , , , , and . SECRYPT, page 387-394. SciTePress, (2013)Collective classification for spam filtering., , , , and . Log. J. IGPL, 21 (4): 540-548 (2013)Twitter Content-Based Spam Filtering., , , , , and . SOCO-CISIS-ICEUTE, volume 239 of Advances in Intelligent Systems and Computing, page 449-458. Springer, (2013)Developing Interoperable Experiences with OpenUIX., and . SUI, page 167. ACM, (2016)Collective classification for packed executable identification., , , , and . CEAS, page 23-30. ACM, (2011)Countering entropy measure attacks on packed software detection., , , , and . CCNC, page 164-168. IEEE, (2012)