Author of the publication

Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining.

, and . Clust. Comput., 25 (6): 3937-3959 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DroidMark: A Tool for Android Malware Detection using Taint Analysis and Bayesian Network., and . CoRR, (2018)A Comparative Analysis of Consensus Algorithms for Decentralized Storage Systems., , and . IT Prof., 24 (6): 59-65 (2022)Blockchain Technology for Cloud Storage: A Systematic Literature Review., , and . ACM Comput. Surv., 53 (4): 89:1-89:32 (2021)A meta-analysis of industry 4.0 design principles applied in the health sector., and . Eng. Appl. Artif. Intell., (2021)Arabic Sign Language Recognition System on Smartphone., and . ICCCNT, page 1-5. IEEE, (2019)A lexical-semantics-based method for multi label text categorisation using word net., and . Int. J. Data Min. Model. Manag., 9 (4): 340-360 (2017)A fuzzy ontology framework in information retrieval using semantic query expansion., , and . Int. J. Inf. Manag. Data Insights, 1 (1): 100009 (2021)Sampling and noise filtering methods for recommender systems: A literature review., and . Eng. Appl. Artif. Intell., (2023)Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining., and . Clust. Comput., 25 (6): 3937-3959 (2022)Scalable machine-learning algorithms for big data analytics: a comprehensive review., , and . WIREs Data Mining Knowl. Discov., 6 (6): 194-214 (2016)