Author of the publication

Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review.

, , and . Artif. Intell. Rev., 56 (8): 8815-8858 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review., , and . Artif. Intell. Rev., 56 (8): 8815-8858 (2023)Soil and Climate Parameters Based Crop Recommendation Model for Yandev, Gboko Local Government Area of Benue State., , , , , and . IMCOM, page 1-7. IEEE, (2024)Sarcasm identification in textual data: systematic review, research challenges and open directions., , , and . Artif. Intell. Rev., 53 (6): 4215-4258 (2020)Context-Based Feature Technique for Sarcasm Identification in Benchmark Datasets Using Deep Learning and BERT Model., , and . IEEE Access, (2021)A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions., , , and . IEEE Access, (2019)A systematic literature review of hate speech identification on Arabic Twitter data: research challenges and future directions., , , , and . PeerJ Comput. Sci., (2024)An Intelligent Gamification Tool to Boost Young Kids Cybersecurity Knowledge on FB Messenger., , , , , and . IMCOM, page 1-8. IEEE, (2022)The empirical study of tweet classification system for disaster response using shallow and deep learning models., , , and . J. Ambient Intell. Humaniz. Comput., 15 (9): 3303-3316 (September 2024)