Author of the publication

AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique.

, , and . Expert Syst. Appl., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Score-based genetic algorithm for scheduling workflow applications in clouds., and . Int. J. Grid Util. Comput., 7 (4): 272-284 (2016)An intelligent water drops-based approach for workflow scheduling with balanced resource utilisation in cloud computing., and . Int. J. Grid Util. Comput., 10 (5): 528-544 (2019)A review of social network centric anomaly detection techniques., and . Int. J. Commun. Networks Distributed Syst., 17 (4): 358-386 (2016)Using the improved PROMETHEE for selection of trustworthy cloud database servers., and . Int. Arab J. Inf. Technol., 16 (2): 194-202 (2019)Social Distancing Violation Detection Using Pre-Trained Object Detection Models., and . OCIT, page 319-324. IEEE, (2021)Energy-efficient secure data fusion scheme for IoT based healthcare system., and . Future Gener. Comput. Syst., (June 2023)Abusive Content Detection in Online User-Generated Data: A survey., , and . ACLING, volume 189 of Procedia Computer Science, page 274-281. Elsevier, (2021)Modelling and simulation of an analytical approach to handle real-time traffic in VoIP network., , , , , and . IJSPM, 13 (1): 35-42 (2018)Deadline and cost based workflow scheduling in hybrid cloud., and . ICACCI, page 840-846. IEEE, (2013)Self-maintenance techniques: a smart approach towards self-maintenance system., , , and . Int. J. Syst. Assur. Eng. Manag., 5 (1): 75-83 (2014)