Author of the publication

A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines.

, , , , and . Concurrency and Computation: Practice and Experience, 28 (4): 1385-1395 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Interlinking Linked Data Sources by Using Ontology Matching Techniques and the Map-Reduce Framework., , , , and . IDEAL, volume 8669 of Lecture Notes in Computer Science, page 53-60. Springer, (2014)Design and Implementation of an Extended Corporate CRMDatabase System with Big Data Analytical Functionalities., , , and . J. UCS, 21 (6): 757-776 (2015)Using Linked Open Data Sources for Entity Disambiguation., , , and . CLEF (Working Notes), volume 1179 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)Community detection in graphs based on surprise maximization using firefly heuristics., , , , and . CEC, page 2233-2239. IEEE, (2016)Semantic Information Fusion of Linked Open Data and Social Big Data for the Creation of an Extended Corporate CRM Database., , , and . IDC, volume 570 of Studies in Computational Intelligence, page 211-221. Springer, (2014)On a Machine Learning Approach for the Detection of Impersonation Attacks in Social Networks., , and . IDC, volume 570 of Studies in Computational Intelligence, page 259-268. Springer, (2014)Intelligent SPARQL Endpoints: Optimizing Execution Performance by Automatic Query Relaxation and Queue Scheduling., , , and . ICA3PP, volume 10048 of Lecture Notes in Computer Science, page 3-17. Springer, (2016)A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines., , , , and . Concurrency and Computation: Practice and Experience, 28 (4): 1385-1395 (2016)A novel adaptive density-based ACO algorithm with minimal encoding redundancy for clustering problems., , , , and . CEC, page 3139-3145. IEEE, (2016)A feature selection method for author identification in interactive communications based on supervised learning and language typicality., , , and . Eng. Appl. of AI, (2016)