Author of the publication

TorBot Stalker: Detecting Tor Botnets Through Intelligent Circuit Data Analysis.

, , and . NCA, page 1-8. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rule Based Networks: An Efficient and Interpretable Representation of Computational Models., , and . J. Artif. Intell. Soft Comput. Res., 7 (2): 111 (2017)Detecting Question Intention Using a K-Nearest Neighbor Based Approach., , and . AIAI (Workshops), volume 520 of IFIP Advances in Information and Communication Technology, page 101-111. Springer, (2018)Design recommendations for designing smart and ubiquitous learning environments to be used at outdoor cultural heritage., , and . IxD&A, (2018)Design and Evaluation of a Case-Based System for Modelling Exploratory Learning Behavior of Math Generalization., and . IEEE Trans. Learn. Technol., 10 (4): 436-449 (2017)Hybrid ensemble learning approach for generation of classification rules., , and . ICMLC, page 377-382. IEEE, (2015)Towards Context-Aware Syntax Parsing and Tagging., , and . ICCSW, volume 66 of OASIcs, page 5:1-5:9. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Identification and Classification of Misogynous Tweets Using Multi-classifier Fusion., , and . IberEval@SEPLN, volume 2150 of CEUR Workshop Proceedings, page 268-273. CEUR-WS.org, (2018)A Survey Study to Gather Requirements for Designing a Mobile Service to Enhance Learning from Cultural Heritage., , , and . EC-TEL, volume 9891 of Lecture Notes in Computer Science, page 547-550. Springer, (2016)User behaviour-driven group formation through case-based reasoning and clustering., and . Expert Syst. Appl., 39 (10): 8756-8768 (2012)Learning Task-Related Strategies from User Data through Clustering., and . ICALT, page 400-404. IEEE Computer Society, (2012)