From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Are the most popular users always trustworthy? The case of Yelp., и . Electron. Commer. Res. Appl., (2016)Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data., , , , и . CoRR, (2019)Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing., , , , , и . ACISP (1), том 9722 из Lecture Notes in Computer Science, стр. 409-425. Springer, (2016)Identifying malicious web domains using machine learning techniques with online credibility and performance data., , , , и . CEC, стр. 5186-5194. IEEE, (2016)Design of a Technology-Enhanced Pedagogical Framework for a Systems and Networking Administration course incorporating a Virtual Laboratory., , , , , , и . FIE, стр. 1-5. IEEE, (2018)Determining Trustworthiness and Quality of Mobile Applications., , и . MOBILWARE, том 65 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 192-206. Springer, (2012)Malicious Web Domain Identification using Online Credibility and Performance Data by Considering the Class Imbalance Issue., , , , и . CoRR, (2018)Malicious web domain identification using online credibility and performance data by considering the class imbalance issue., , , , и . Ind. Manag. Data Syst., 119 (3): 676-696 (2019)Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments., , и . ACM Trans. Internet Techn., 12 (3): 8:1-8:35 (2013)A distributed mechanism for secure collaboration in digital ecosystems., , и . MEDES, стр. 33-39. ACM, (2011)