Author of the publication

Authorship verification applied to detection of compromised accounts on online social networks - A continuous approach.

, , and . Multimedia Tools Appl., 76 (3): 3213-3233 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Approaches for XML Data Compression., , , , and . WEBIST, page 233-237. SciTePress, (2012)Mobile botnets detection based on machine learning over system calls., , , , and . Int. J. Secur. Networks, 14 (2): 103-118 (2019)Construction of baselines for VoIP traffic management on open MANs., , , , and . Int. J. Netw. Manag., 23 (2): 137-153 (2013)Evaluating the Four-Way Performance Trade-Off for Data Stream Classification in Edge Computing., , , , and . IEEE Trans. Netw. Serv. Manag., 17 (2): 1013-1025 (2020)A New Approach for Fuzzy Classification in Relational Databases., , , and . DEXA (2), volume 6861 of Lecture Notes in Computer Science, page 511-518. Springer, (2011)Deep IP flow inspection to detect beyond network anomalies., , , and . Comput. Commun., (2017)Metrics Application in Metropolitan Broadband Access Network Security Analysis., , , and . SECRYPT, page 473-476. INSTICC Press, (2008)Time Series Segmentation Based on Stationarity Analysis to Improve New Samples Prediction., , , and . Sensors, 21 (21): 7333 (2021)Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks., , , and . Secur. Commun. Networks, (2019)Photovoltaic Generation Forecast: Model Training and Adversarial Attack Aspects., , , and . BRACIS (2), volume 12320 of Lecture Notes in Computer Science, page 634-649. Springer, (2020)