Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An intelligent clustering approach for improving search result of a website., , and . Int. J. Adv. Intell. Paradigms, 12 (3/4): 295-304 (2019)Escalation of TRUST analysis in web., and . Conf. Computing Frontiers, page 56:1-56:6. ACM, (2015)Intellectualizing TRUST for Medical Websites., and . ICTCS, page 83:1-83:4. (2016)Mitigating Information Trust: Taking the Edge off Health Websites., and . Int. J. Technoethics, 7 (1): 16-33 (2016)An MCDM approach towards handling outliers in web data: a case study using OWA operators., and . Artif. Intell. Rev., 46 (1): 59-82 (2016)Modeling anonymous human behavior using social media., and . ICITST, page 409-412. IEEE, (2014)Trust evaluation of websites: a comprehensive study., and . Int. J. Adv. Intell. Paradigms, 13 (1/2): 101-112 (2019)Developing Cyber Security Asset Management framework for UK rail.. CyberSA, page 1-6. IEEE, (2016)Classification and Clustering Algorithms of Machine Learning with their Applications., , , , and . Nature-Inspired Computation in Data Mining and Machine Learning, volume 855 of Studies in Computational Intelligence, Springer, (2020)Conceptual model for obfuscated TRUST induced from web analytics data for content-driven websites., and . ICACCI, page 2781-2785. IEEE, (2014)