From post

A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks.

, , , и . CISIS, том 85 из Advances in Intelligent and Soft Computing, стр. 135-142. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Spam Filtering through Anomaly Detection., , , , и . ICETE (Selected Papers), том 314 из Communications in Computer and Information Science, стр. 203-216. Springer, (2011)Collective Classification for Spam Filtering., , , , и . CISIS, том 6694 из Lecture Notes in Computer Science, стр. 1-8. Springer, (2011)Instance-based Anomaly Method for Android Malware Detection., , , , , и . SECRYPT, стр. 387-394. SciTePress, (2013)Enhancing cybersecurity learning through an augmented reality-based serious game., , , и . EDUCON, стр. 602-607. IEEE, (2013)Anomaly-based Spam Filtering., , , , и . SECRYPT, стр. 5-14. SciTePress, (2011)Anomaly Detection Using String Analysis for Android Malware Detection., , , , , и . SOCO-CISIS-ICEUTE, том 239 из Advances in Intelligent Systems and Computing, стр. 469-478. Springer, (2013)Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour., , , , , и . CISIS/ICEUTE/SOCO Special Sessions, том 189 из Advances in Intelligent Systems and Computing, стр. 261-270. Springer, (2012)Opcode-Sequence-Based Semi-supervised Unknown Malware Detection., , , , и . CISIS, том 6694 из Lecture Notes in Computer Science, стр. 50-57. Springer, (2011)On the study of anomaly-based spam filtering using spam as representation of normality., , , , , и . CCNC, стр. 693-695. IEEE, (2012)Twitter Content-Based Spam Filtering., , , , , и . SOCO-CISIS-ICEUTE, том 239 из Advances in Intelligent Systems and Computing, стр. 449-458. Springer, (2013)