Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data., and . ICISTM, volume 31 of Communications in Computer and Information Science, page 356-357. Springer, (2009)Gossip-Based Behavioral Group Identification in Decentralized OSNs., , , and . MLDM, volume 9729 of Lecture Notes in Computer Science, page 676-691. Springer, (2016)Graph Based Local Risk Estimation in Large Scale Online Social Networks., , and . SmartCity, page 528-535. IEEE Computer Society, (2015)Anomalous change detection in time-evolving OSNs., , and . Med-Hoc-Net, page 1-8. IEEE, (2016)A Taxonomy of Frauds and Fraud Detection Techniques., and . ICISTM, volume 31 of Communications in Computer and Information Science, page 256-267. Springer, (2009)A hybrid fraud scoring and spike detection technique in streaming data., and . Intell. Data Anal., 14 (6): 773-800 (2010)Risk Assessment in Social Networks Based on User Anomalous Behaviors., , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 295-308 (2018)