Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Evidentiary Value of Link Files in Linux File System to Digital Forensic Investigation., and . CIT/IUCC/DASC/PICom, page 1984-1988. IEEE, (2015)Feature selection in UNSW-NB15 and KDDCUP'99 datasets., and . ISIE, page 1881-1886. IEEE, (2017)Content-Aware Tweet Location Inference Using Quadtree Spatial Partitioning and Jaccard-Cosine Word Embedding., , and . ASONAM, page 1116-1123. IEEE Computer Society, (2018)Feature Selection in the Corrected KDD-dataset., and . EIDWT, page 174-180. IEEE Computer Society, (2012)An iterative multiple sampling method for intrusion detection., and . Inf. Secur. J. A Glob. Perspect., 27 (4): 230-239 (2018)Policing as a Service in the Cloud., and . Inf. Secur. J. A Glob. Perspect., 23 (4-6): 148-158 (2014)Sentiment Aware Fake News Detection on Online Social Networks., , and . ICASSP, page 2507-2511. IEEE, (2019)An Overview and Computer Forensic Challenges in Image Steganography., and . iThings/GreenCom/CPSCom/SmartData, page 360-364. IEEE Computer Society, (2017)A statistical downscaling framework for environmental mapping., , , and . J. Supercomput., 75 (2): 984-997 (2019)An Investigation of Using Classification Techniques in Prediction of Type of Targets in Cyber Attacks., , and . ICGS3, IEEE, (2019)