Author of the publication

A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines.

, , , , and . Concurrency and Computation: Practice and Experience, 28 (4): 1385-1395 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Centralized synchronization methods for distributed detection in sensor networks., and . ISWCS, page 480-484. IEEE, (2010)Architecture and Approach for Obtaining Spectrum Availability Information., , , and . VTC Spring, page 1-5. IEEE, (2011)Design and Implementation of an Extended Corporate CRMDatabase System with Big Data Analytical Functionalities., , , and . J. UCS, 21 (6): 757-776 (2015)A Meta-heuristically Optimized Fuzzy Approach towards Multi-metric Security Risk Assessment in Heterogeneous System of Systems., and . PECCS, page 231-236. SciTePress, (2014)Pulsed multi-band MIMO for UWB systems., , and . EUSIPCO, page 2030-2034. IEEE, (2007)Synchronization of faulty processors in coarse-grained TMR protected partially reconfigurable FPGA designs., , , , and . Rel. Eng. & Sys. Safety, (2016)On the Design of a Novel Joint Network-Channel Coding Scheme for the Multiple Access Relay Channel., , and . IEEE Journal on Selected Areas in Communications, 31 (8): 1368-1378 (2013)Beamwidth Optimization in Millimeter Wave Small Cell Networks with Relay Nodes: A Swarm Intelligence Approach., , , , and . CoRR, (2016)On the Design of a Novel Joint Network-Channel Coding Scheme for the Multiple Access Relay Channel, , and . CoRR, (2012)Flexible Channel Coding Approach for Short-Length Codewords., , and . IEEE Communications Letters, 16 (9): 1508-1511 (2012)