Author of the publication

An assessment of features related to phishing websites using an automated technique.

, , and . ICITST, page 492-497. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Self-Structuring Neural Network., , and . PAKDD Workshops, volume 9794 of Lecture Notes in Computer Science, page 35-47. Springer, (2016)Large-scale Parallel Stratified Defeasible Reasoning., , , , and . ECAI, volume 242 of Frontiers in Artificial Intelligence and Applications, page 738-743. IOS Press, (2012)An assessment of features related to phishing websites using an automated technique., , and . ICITST, page 492-497. IEEE, (2012)Intelligent rule-based phishing websites classification., , and . IET Inf. Secur., 8 (3): 153-160 (2014)Progress in machine learning - Proceedings of EWSL 87: Second European working session on learning by I. Bratko and N. Lavrac (eds.), Sigma Press, pp 256, £14.95.. Knowledge Eng. Review, 4 (3): 251-252 (1989)Introduction to the Special Issue on Knowledge Engineering Tools and Techniques for Automated Planning and Scheduling Systems., and . Knowledge Eng. Review, 22 (2): 115-116 (2007)The First Competition on Knowledge Engineering for Planning and Scheduling., and . AI Magazine, 27 (1): 97-98 (2006)Tutorial and critical analysis of phishing websites methods., , and . Comput. Sci. Rev., (2015)A New Classification Based on Association Algorithm., , , and . J. Inf. Knowl. Manag., 9 (1): 55-64 (2010)Preface to special issue on planning and scheduling., , , and . Knowledge Eng. Review, 25 (3): 247-248 (2010)