Author of the publication

Lexical URL analysis for discriminating phishing and legitimate e-mail messages.

, , and . ICITST, page 422-427. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber Security & Ethical Hacking For SMEs., and . KMO, page 12. ACM, (2016)Use of Computer Vision for White Line Detection for Robotic Applications., , and . EIT, page 509-514. IEEE, (2019)Azithromycin blocks autophagy and may predispose cystic fibrosis patients to mycobacterial infection., , , , , , , , , and 11 other author(s). J Clin Invest, 121 (9): 3554--3563 (September 2011)Modular elliptic curves over the field of twelfth roots of unity.. LMS J. Comput. Math., 19 (1): 155-174 (2016)Achieving eye contact in a one-to-many 3D video teleconferencing system., , , , , , , and . ACM Trans. Graph., 28 (3): 64 (2009)XaaS: Acceleration as a Service to Enable Productive High-Performance Cloud Computing., , , , , , , , , and 1 other author(s). CoRR, (2024)Smart-frame: A flexible, scalable, and secure information management framework for smart grids., , , , and . ICITST, page 668-673. IEEE, (2012)Forensics data acquisition methods for mobile phones., , and . ICITST, page 265-269. IEEE, (2012)Measurement-based synthesis of facial microgeometry., , , , , , and . SIGGRAPH Posters, page 60. ACM, (2012)Creating near-field VR using stop motion characters and a touch of light-field rendering., , , , , , , , , and 4 other author(s). SIGGRAPH Posters, page 19:1. ACM, (2015)