Author of the publication

Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking.

, , , and . ICDM, volume 8557 of Lecture Notes in Computer Science, page 39-54. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack Modelling and Security Evaluation for Security Information and Event Management., , and . SECRYPT, page 391-394. SciTePress, (2012)Security and Anonymity in Agent Systems., and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Software Agents for Computer Network Security., and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community., , and . SEC, volume 175 of IFIP Conference Proceedings, page 291-300. Kluwer, (2000)Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 5 (3): 14-29 (2014)Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems., , , and . Future Internet, 5 (3): 355-375 (2013)Systematic Literature Review of Security Event Correlation Methods., , and . IEEE Access, (2022)Agent-based simulation of cooperative defence against botnets., , and . Concurr. Comput. Pract. Exp., 24 (6): 573-588 (2012)Social networks analysis by graph algorithms on the example of the VKontakte social network., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 10 (2): 55-75 (2019)Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects., , and . Inf., 11 (3): 168 (2020)