Author of the publication

Mitigation of spear phishing attacks: A Content-based Authorship Identification framework.

, , and . ICITST, page 416-421. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XaaS: Acceleration as a Service to Enable Productive High-Performance Cloud Computing., , , , , , , , , and 1 other author(s). CoRR, (2024)Azithromycin blocks autophagy and may predispose cystic fibrosis patients to mycobacterial infection., , , , , , , , , and 11 other author(s). J Clin Invest, 121 (9): 3554--3563 (September 2011)Modular elliptic curves over the field of twelfth roots of unity.. LMS J. Comput. Math., 19 (1): 155-174 (2016)Cyber Security & Ethical Hacking For SMEs., and . KMO, page 12. ACM, (2016)Use of Computer Vision for White Line Detection for Robotic Applications., , and . EIT, page 509-514. IEEE, (2019)Achieving eye contact in a one-to-many 3D video teleconferencing system., , , , , , , and . ACM Trans. Graph., 28 (3): 64 (2009)Smart-frame: A flexible, scalable, and secure information management framework for smart grids., , , , and . ICITST, page 668-673. IEEE, (2012)Forensics data acquisition methods for mobile phones., , and . ICITST, page 265-269. IEEE, (2012)The Value of Metadata in Digital Forensics., and . EISIC, page 182. IEEE Computer Society, (2015)A cell phone based platform for facial performance capture., , , , , , and . SIGGRAPH Posters, page 35. ACM, (2012)