Author of the publication

An unsupervised method for social network spammer detection based on user information interests.

, , and . J. Big Data, 9 (1): 7 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy., , and . AISC, volume 161 of CRPIT, page 67-70. Australian Computer Society, (2015)Ubiquitous Authorization Scheme Based on Device Profile., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 312-321. Springer, (2006)An Improved Forward Integrity Protocol for Mobile Agents., , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 272-285. Springer, (2003)Linkability in Practical Electronic Cash Design., , , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 149-163. Springer, (2000)Analysis of two authorization protocols using Colored Petri Nets., , , and . Int. J. Inf. Sec., 14 (3): 221-247 (2015)Machine Learning to Optimize TCP Communications Over High Frequency Communications Links., , , and . IEEE Access, (2022)Denial-of-service resistance in key establishment., , , , and . Int. J. Wirel. Mob. Comput., 2 (1): 59-71 (2007)Towards Secure and Legal E-Tendering., , , , , , , and . J. Inf. Technol. Constr., (2006)An Implementation of the Yao Forward Integrity Protocol for Mobile Agents., , and . Cryptographic Algorithms and their Uses, page 110-124. Queensland University of Technology, (2004)Authentication strategies in vehicular communications: a taxonomy and framework., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 129 (2021)