Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Rule-based Temporal Alert Correlation System., and . Int. J. Netw. Secur., 5 (1): 66-72 (2007)Multimodal Fake News Analysis Based on Image-Text Similarity., , , , and . IEEE Trans. Comput. Soc. Syst., 11 (1): 959-972 (February 2024)Social Alignment Contagion in Online Social Networks., , , , , , and . IEEE Trans. Comput. Soc. Syst., 11 (1): 399-417 (February 2024)Are You a Cyborg, Bot or Human? - A Survey on Detecting Fake News Spreaders., , , , , and . IEEE Access, (2022)Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification., , , , , , and . IEEE Internet Things J., 11 (2): 2322-2335 (January 2024)Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS., , , , and . IEEE Internet Things J., 7 (12): 11524-11535 (2020)QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution., , and . IEEE Access, (2022)The analysis and management of non-canonical requirement specifications through a belief integration game., and . Knowl. Inf. Syst., 22 (1): 27-64 (2010)Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods., , and . IEEE Trans. Syst. Man Cybern. Part C, 40 (5): 516-524 (2010)Semantic Disambiguation and Linking of Quantitative Mentions in Textual Content., , , , and . Int. J. Semantic Comput., 10 (1): 121- (2016)