Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Android Malware Detection Through Dimensionality Reduction Techniques., , and . MLN, volume 12629 of Lecture Notes in Computer Science, page 57-72. Springer, (2020)A Profile-Based Method for Authorship Verification., and . SETN, volume 8445 of Lecture Notes in Computer Science, page 313-326. Springer, (2014)Improved algorithms for extrinsic author verification., and . Knowl. Inf. Syst., 62 (5): 1903-1921 (2020)Authorship verification. University of the Aegean, Greece, (2019)National Archive of PhD Theses: oai:10442/45382.Two Anatomists Are Better than One - Dual-Level Android Malware Detection., , , and . Symmetry, 12 (7): 1128 (2020)Dynamic Ensemble Selection for Author Verification., and . ECIR (1), volume 11437 of Lecture Notes in Computer Science, page 102-115. Springer, (2019)Cyberbullying Detection using Time Series Modeling., and . ICDM Workshops, page 373-382. IEEE Computer Society, (2014)Time Series Forecasting in Cyberbullying Data., and . EANN, volume 517 of Communications in Computer and Information Science, page 289-303. Springer, (2015)A biology-inspired, data mining framework for extracting patterns in sexual cyberbullying data., , and . Knowl. Based Syst., (2016)An extrinsic random-based ensemble approach for android malware detection., , and . Connect. Sci., 33 (4): 1077-1093 (2021)