Author of the publication

Detection of Forwarding-Based Malicious URLs in Online Social Networks.

, , , , and . International Journal of Parallel Programming, 44 (1): 163-180 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A module-level three-stage approach to the evolutionary design of sequential logic circuits., , , and . Genetic Programming and Evolvable Machines, 14 (2): 191-219 (2013)Ga-Based Alternative Approaches for the Degree-Constrained Spanning Tree Problem., , , and . IJPRAI, 23 (1): 129-144 (2009)An Integrated Multi-Agent CSCW System for Concurrent Product Development., and . International Journal of Information Technology and Decision Making, 1 (3): 423-440 (2002)Method of using BDI agents to implement service-oriented workflow mapping in AGWMS., , , and . IJPEDS, 23 (2): 171-195 (2008)Bivariate generating functions for Rogers-Szegö polynomials.. Applied Mathematics and Computation, 217 (5): 2209-2216 (2010)Detection of Forwarding-Based Malicious URLs in Online Social Networks., , , , and . International Journal of Parallel Programming, 44 (1): 163-180 (2016)A Distributed Application Component Placement Approach for Cloud Computing Environment., , and . DASC, page 488-495. IEEE Computer Society, (2011)A Goal Driven Configurable Service Workflow Model., , , and . GCC, page 663-669. IEEE Computer Society, (2007)Improved HTN Planning Approach for Service Composition., , , and . IEEE SCC, page 609-612. IEEE Computer Society, (2004)A Multi-agent Learning Model for Service Composition., , , and . APSCC, page 70-75. IEEE Computer Society, (2012)