Author of the publication

Detection of cross site scripting attack in wireless networks using n-Gram and SVM.

, , , and . Mob. Inf. Syst., 8 (3): 275-286 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correcting Misspelled Words in Twitter Text., , , and . BDTA, volume 194 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 83-90. Springer, (2016)A Design of Web Log Integration Framework Using NoSQL., , , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 438-445. Springer, (2014)Topic Selection of Web Documents Using Specific Domain Ontology., , , , and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 1047-1056. Springer, (2006)Quantization of Colors Using Median of Pixels for Color Correlogram., , and . Edutainment, volume 4469 of Lecture Notes in Computer Science, page 723-729. Springer, (2007)Intelligent Healthcare Service Using Health Lifelog Analysis., , , and . J. Medical Systems, 40 (8): 188:1-188:10 (2016)Kansei Processing Agent for Personalizing Retrieval., , and . User Modeling, volume 4511 of Lecture Notes in Computer Science, page 390-394. Springer, (2007)Representing the Spatial Relations in the Semantic Web Ontologies., , , , , and . Australian Conference on Artificial Intelligence, volume 2903 of Lecture Notes in Computer Science, page 77-87. Springer, (2003)Modeling for context-aware healthcare service using ontology., , and . SAC, page 1729-1730. ACM, (2014)Design of inference rules for plant growth based on ontology., , and . RACS, page 92-95. ACM, (2015)Semantic Context Extraction from Wikipedia Document., , and . SWWS, page 38-41. CSREA Press, (2010)