Author of the publication

Efficiently Detecting Web Spambots in a Temporally Annotated Sequence.

, , and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 1007-1019. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Alamro, Hayam
add a person with the name Alamro, Hayam
 

Other publications of authors with the same name

Exploiting Remote Sensing Imagery for Vehicle Detection and Classification Using an Artificial Intelligence Technique., , , , , and . Remote. Sens., 15 (18): 4600 (September 2023)Efficient Identification of k-Closed Strings., , , , , and . Int. J. Found. Comput. Sci., 31 (5): 595-610 (2020)Automated Android Malware Detection Using Optimal Ensemble Learning Approach for Cybersecurity., , , , , and . IEEE Access, (2023)Modeling of Blockchain Assisted Intrusion Detection on IoT Healthcare System Using Ant Lion Optimizer With Hybrid Deep Learning., , , , , , , and . IEEE Access, (2023)Efficiently Detecting Web Spambots in a Temporally Annotated Sequence., , and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 1007-1019. Springer, (2020)Chaotic Mapping Lion Optimization Algorithm-Based Node Localization Approach for Wireless Sensor Networks., , , , , and . Sensors, 23 (21): 8699 (October 2023)Efficient Identification of k-Closed Strings., , , , , and . EANN, volume 744 of Communications in Computer and Information Science, page 583-595. Springer, (2017)Modeling of Reptile Search Algorithm With Deep Learning Approach for Copy Move Image Forgery Detection., , , , , , , and . IEEE Access, (2023)Semi-supervised generative adversarial networks for improved colorectal polyp classification using histopathological images., , , , , , , , , and 1 other author(s). Inf. Sci., (February 2024)Modified Red Fox Optimizer With Deep Learning Enabled False Data Injection Attack Detection., , , , , and . IEEE Access, (2023)