Author of the publication

A heuristic technique to detect phishing websites using TWSVM classifier.

, , and . Neural Comput. Appl., 33 (11): 5733-5752 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A trust model based batch verification of digital signatures in IoT., and . J. Ambient Intell. Humaniz. Comput., 11 (1): 313-327 (2020)Enhanced optical flow-based full reference video quality assessment algorithm., , and . Multim. Tools Appl., 81 (27): 39491-39505 (November 2022)A new probabilistic rekeying method for secure multicast groups., and . Int. J. Inf. Sec., 9 (4): 275-286 (2010)En-Route Filtering Techniques in Wireless Sensor Networks: A Survey., and . Wirel. Pers. Commun., 96 (1): 697-739 (2017)Object detection in hyperspectral images., and . Digit. Signal Process., (2022)Fuzzy String Matching Algorithm for Spam Detection in Twitter., , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 289-301. Springer, (2018)Emulating a High Interaction Honeypot to Monitor Intrusion Activity., and . SSCC, volume 377 of Communications in Computer and Information Science, page 70-76. Springer, (2013)Fast Verification of Digital Signatures in IoT., , and . SSCC, volume 746 of Communications in Computer and Information Science, page 16-27. Springer, (2017)Batch verification of Digital Signatures: Approaches and challenges., and . J. Inf. Secur. Appl., (2017)PhishDump: A multi-model ensemble based technique for the detection of phishing sites in mobile devices., , and . Pervasive Mob. Comput., (2019)