Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies., and . Int. J. Inf. Secur. Priv., 13 (2): 47-66 (2019)E-mail classification with machine learning and word embeddings for improved customer support., , , and . Neural Comput. Appl., 33 (6): 1881-1902 (2021)Alarm Prediction in Cellular Base Stations Using Data-Driven Methods., , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1925-1933 (2021)Predicting e-Mail Response Time in Corporate Customer Support., , and . ICEIS (1), page 305-314. SCITEPRESS, (2020)Analysing Countermeasures Against Privacy-Invasive Software., and . ICSEA, page 61. IEEE Computer Society, (2006)Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data., and . EISIC, page 92-95. IEEE Computer Society, (2016)Using Conformal Prediction for Multi-label Document Classification in e-Mail Support Systems., , and . IEA/AIE, volume 11606 of Lecture Notes in Computer Science, page 308-322. Springer, (2019)Crawling Online Social Networks., , , , and . ENIC, page 9-16. IEEE Computer Society, (2015)A risk analysis of a smart home automation system, , and . (Mar 1, 2016)Computer forensic timeline visualization tool., and . Digit. Investig., 6 (Supplement): S78-S87 (2009)