Author of the publication

A Risk Analysis Framework for Social Engineering Attack Based on User Profiling.

, , , , , and . J. Organ. End User Comput., 32 (3): 37-49 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A probabilistic routing algorithm based on node communication capability and message strength., , , , , and . Int. J. Satell. Commun. Netw., 41 (1): 42-58 (January 2023)A Risk Analysis Framework for Social Engineering Attack Based on User Profiling., , , , , and . J. Organ. End User Comput., 32 (3): 37-49 (2020)Multi-MedVit: a deep learning approach for the diagnosis of COVID-19 with the CT images., , , , , and . BIBM, page 2247-2252. IEEE, (2022)Medical image classification based on multi-scale non-negative sparse coding., , , , and . Artif. Intell. Medicine, (2017)A data sharing method for remote medical system based on federated distillation learning and consortium blockchain., , , , , and . Connect. Sci., (December 2023)A Range-Null Space Decomposition Approach for Fast and Flexible Spectral Compressive Imaging., , , , , and . CoRR, (2023)Multi-level Multiple Instance Learning with Transformer for Whole Slide Image Classification., , , , , and . CoRR, (2023)Hybrid beamforming for multi-user MIMO with partially-connected RF architecture., , , and . IET Commun., 13 (10): 1356-1363 (2019)A Point Cloud Registration Framework with Color Information Integration., , , , , and . Remote. Sens., 16 (5): 743 (March 2024)Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure Construction., , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 377-388. (2016)