Author of the publication

Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach.

, , , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognitive Security for Incident Management Process., , and . ICITS, volume 918 of Advances in Intelligent Systems and Computing, page 612-621. Springer, (2019)Management of information security indicators under a cognitive security model., , and . CCWC, page 478-483. IEEE, (2018)Empirical study on the difficulties of software modeling through class diagrams., , and . HICSS, page 1-10. ScholarSpace, (2022)XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities., , , , and . CSNet, page 142-149. IEEE, (2019)Current Trends in Blockchain Implementations on the Paradigm of Public Key Infrastructure: A Survey., , , and . IEEE Access, (2022)An Innovative and Decentralized Identity Framework Based on Blockchain Technology., , , and . NTMS, page 1-8. IEEE, (2021)Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study., , , , , , and . MICRADS, volume 152 of Smart Innovation, Systems and Technologies, page 507-519. Springer, (2019)A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy., , , , , , and . ICEIS (2), page 328-336. SciTePress, (2019)Secure and revocable node authentication in Vehicular Ad-Hoc Networks., , and . ISCC, page 293-298. IEEE Computer Society, (2013)Cookie Scout: An Analytic Model for Prevention of Cross-Site Scripting (XSS) Using a Cookie Classifier., , , , and . ICITS, volume 721 of Advances in Intelligent Systems and Computing, page 497-507. Springer, (2018)