Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly detection using fuzzy association rules., , , , and . Int. J. Electron. Secur. Digit. Forensics, 6 (1): 25-37 (2014)A Fuzzy-Based Approach for Cyberbullying Analysis., , , , , and . IPMU (2), volume 1602 of Communications in Computer and Information Science, page 317-328. Springer, (2022)Generalized Association Rules for Sentiment Analysis in Twitter., , and . FQAS, volume 11529 of Lecture Notes in Computer Science, page 166-175. Springer, (2019)Detecting Anomalous and Exceptional Behaviour on Credit Data by Means of Association Rules., , , and . FQAS, volume 8132 of Lecture Notes in Computer Science, page 143-154. Springer, (2013)Bot Detection in Twitter: An Overview., , , and . FQAS, volume 14113 of Lecture Notes in Computer Science, page 131-144. Springer, (2023)A Comparative Study of Word Embeddings for the Construction of a Social Media Expert Filter., , and . FQAS, volume 12871 of Lecture Notes in Computer Science, page 196-208. Springer, (2021)Summarizing Documents Using Fractal Techniques., and . ICEIS (4), page 26-33. (2007)Comparing Partitions by Means of Fuzzy Data Mining Tools., , , , and . SUM, volume 7520 of Lecture Notes in Computer Science, page 337-350. Springer, (2012)Representation by levels: An alternative to fuzzy sets for fuzzy data mining., , and . Fuzzy Sets Syst., (2020)Fuzzy frameworks for mining data associations: fuzzy association rules and beyond., , and . WIREs Data Mining Knowl. Discov., 6 (2): 50-69 (2016)