Author of the publication

A Method for Social Network Extraction From E-Government.

, , and . Int. J. Inf. Syst. Serv. Sect., 11 (3): 37-55 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weighted consensus clustering and its application to Big data., , and . Expert Syst. Appl., (2020)Bibliometric Analysis of IP&M Journal (1980–2015)., , , and . J. Sci. Res., 7 (1): 54-62 (2018)Image-based malicious Internet content filtering method for child protection., , and . J. Inf. Secur. Appl., (2022)Computational Approach for Detection of Illegal Activity over the Internet., , and . JISIC, page 326. IEEE, (2014)An unsupervised approach to generating generic summaries of documents., , and . Appl. Soft Comput., (2015)Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems., , and . Neural Comput. Appl., 33 (16): 10211-10226 (2021)Efficient algorithm for big data clustering on single machine., , and . CAAI Trans. Intell. Technol., 5 (1): 9-14 (2020)The Improved LSTM and CNN Models for DDoS Attacks Prediction in Social Media., , and . Int. J. Cyber Warf. Terror., 9 (1): 1-18 (2019)Development of risk factor management method for federation of clouds., and . ICCVE, page 24-29. IEEE, (2014)PDLK: Plagiarism detection using linguistic knowledge., , , and . Expert Syst. Appl., 42 (22): 8936-8946 (2015)