Author of the publication

Efficient decision support for detecting content polluters on social networks: an approach based on automatic knowledge acquisition from behavioral patterns.

, and . Inf. Technol. Manag., 17 (1): 95-105 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Detection of Content Polluters in Social Networks., and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 991-996. Springer, (2012)On Performance Improvement for 802.11-based Multi-hop Ad Hoc Wireless Networks., , , and . ISSADS, volume 3563 of Lecture Notes in Computer Science, page 407-416. Springer, (2005)Efficient decision support for detecting content polluters on social networks: an approach based on automatic knowledge acquisition from behavioral patterns., and . Inf. Technol. Manag., 17 (1): 95-105 (2016)Domain Modeling for Knowledge-Based Systems: An Approach Based on Objects, Events, and Rules. University of Illinois Urbana-Champaign, USA, (1997)Design and analysis of a new parallel grasper having spherical motion., , and . IROS, page 106-111. IEEE, (2004)Transient Coordinator: a Collision Resolution Algorithm for Asynchronous MAC Protocols in Wireless Sensor Networks., , and . KSII Trans. Internet Inf. Syst., 6 (12): 3152-3165 (2012)Virtual Sink Rotation: Low-Energy Scalable Routing Protocol for Ubiquitous Sensor Networks., , , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 1128-1137. Springer, (2005)BCTMA(Bi-directional Cut-Through Medium Access) Protocol for 802.11-Based Multi-hop Wireless Networks., , , and . ISSADS, volume 3563 of Lecture Notes in Computer Science, page 377-387. Springer, (2005)Replacing media caches in streaming proxy servers., , , , and . J. Syst. Archit., 52 (1): 25-40 (2006)OTT user authentication system by age classification., , , and . J. Comput. Virol. Hacking Tech., 12 (3): 169-175 (2016)