Author of the publication

Unsupervised Spam Detection in Hyves Using SALSA.

, and . FICTA, volume 404 of Advances in Intelligent Systems and Computing, page 517-526. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsupervised Spam Detection in Hyves Using SALSA., and . FICTA, volume 404 of Advances in Intelligent Systems and Computing, page 517-526. Springer, (2015)Cooperative routing in mobile ad hoc networks using fuzzy logic., and . Int. J. Ad Hoc Ubiquitous Comput., 25 (3): 147-162 (2017)Correction to: CS-CGMP: Clustering Scheme Using Canada Geese Migration Principle for Routing in Wireless Sensor Networks., , and . Wirel. Pers. Commun., 115 (2): 1385 (2020)DR-NAP: Data reduction strategy using neural adaptation phenomenon in wireless sensor networks., , , , and . Int. J. Commun. Syst., (2023)SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection., , and . FICTA (2), volume 1177 of Advances in Intelligent Systems and Computing, page 41-50. Springer, (2020)Detection of Phishing Attacks using Radial Basis Function Network Trained for Categorical Attributes., , and . ICCCNT, page 1-6. IEEE, (2020)Vehicle monitoring using internet of things., , and . IML, page 24:1-24:7. ACM, (2017)Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN)., , and . ICCCNT, page 1-7. IEEE, (2019)Latent Fingerprint preprocessing: Orientation field correction using region wise dictionary., and . ICACCI, page 1238-1243. IEEE, (2015)Information Retrieval From Internet Applications For Digital Forensic, and . CoRR, (2012)