Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Holistic View of Big Data., , and . IJDWM, 10 (3): 59-69 (2014)On botnets., , , and . iiWAS, page 5-10. ACM, (2010)A Three-Step Preprocessing Algorithm for Minimizing E-Mail Document's Atypical Characteristics., and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 561-566. Springer, (2005)Component-Based Recommendation Agent System for Efficient Email Inbox Management., and . CIS, volume 3314 of Lecture Notes in Computer Science, page 812-818. Springer, (2004)On cyberattack mechanisms., , , , and . Int. J. Web Grid Serv., 9 (4): 351-368 (2013)The dark side of the Internet: Attacks, costs and responses., , , and . Inf. Syst., 36 (3): 675-705 (2011)On Social e-Learning., and . ICWL, volume 5686 of Lecture Notes in Computer Science, page 12-24. Springer, (2009)Social Community Based Blog Search Framework., and . DASFAA Workshops, volume 7240 of Lecture Notes in Computer Science, page 130-141. Springer, (2012)A comparison of ontology reasoning systems using query sequences., , , , , and . ICUIMC, page 543-546. ACM, (2008)SNS-based recommendation mechanisms for social media.. Multimedia Tools Appl., 74 (7): 2433-2447 (2015)