Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lexical URL analysis for discriminating phishing and legitimate websites., , and . CEAS, page 109-115. ACM, (2011)A study of feature subset evaluators and feature subset searching methods for phishing classification., , and . CEAS, page 135-144. ACM, (2011)Power Allocation for Reliable SIC Detection of Rectangular QAM-based NOMA Systems., and . IEEE Trans. Veh. Technol., 70 (8): 8355-8360 (2021)An Empirical Evaluation for Feature Selection Methods in Phishing Email Classification., , and . Comput. Syst. Sci. Eng., (2013)Phishing Detection: A Literature Survey., , and . IEEE Commun. Surv. Tutorials, 15 (4): 2091-2121 (2013)Gateway Placement Optimization in Wireless Mesh Networks With QoS Constraints., , , and . IEEE J. Sel. Areas Commun., 24 (11): 2127-2136 (2006)Grid-Controlled Lightpaths for High Performance Grid Applications., , , , and . J. Grid Comput., 1 (4): 387-394 (2003)An Enhanced Emotion Recognition Algorithm Using Pitch Correlogram, Deep Sparse Matrix Representation and Random Forest Classifier., , , and . IEEE Access, (2021)A Power and Spectrum Efficient Uplink Transmission Scheme for QoS-Constrained IoT Networks., , , , and . IEEE Internet Things J., 9 (18): 17425-17439 (2022)A State-of-the-Art Review of Cloud Forensics., , and . J. Digit. Forensics Secur. Law, 9 (4): 7-28 (2014)