Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSN: Portfolio Social Network., , and . CoRR, (2013)From Public Outrage to the Burst of Public Violence: An Epidemic-Like Model., , and . CoRR, (2013)CEAI: CCM based Email Authorship Identification Model., and . CoRR, (2013)On the computational models for the analysis of illicit activities., , , and . CoRR, (2019)Detection of Illegitimate Emails Using Boosting Algorithm., , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)Testing and validating the ERP success evaluation model for higher education institutes of Pakistan., , , , , and . Int. J. Bus. Inf. Syst., 25 (2): 165-191 (2017)A methodology for domain and culture-oriented heuristics creation and validation., , , , , and . Behav. Inf. Technol., 41 (8): 1769-1795 (2022)Modeling Suspicious Email Detection using Enhanced Feature Selection., , , and . CoRR, (2013)Heuristic Evaluation Versus Guideline Reviews: A Tale of Comparing Two Domain Usability Expert's Evaluation Methods., , , , , and . IEEE Trans. Prof. Commun., 65 (4): 516-529 (2022)Semantic Analysis of FBI News Reports., and . ICONIP (4), volume 7666 of Lecture Notes in Computer Science, page 322-329. Springer, (2012)