Author of the publication

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.

, , , , and . ICC, page 1990-1994. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Camouflage texture evaluation using a saliency map., , , and . Multimedia Syst., 21 (2): 169-175 (2015)Modeling and convergence analysis of a continuous multi-objective differential evolution algorithm., , and . Congress on Evolutionary Computation, page 228-235. IEEE, (2005)SURE-LET image deconvolution using multiple Wiener filters., , and . ICIP, page 3037-3040. IEEE, (2012)Network Coding for Two-Way Relaying: Rate Region, Sum Rate and Opportunistic Scheduling., and . ICC, page 1044-1049. IEEE, (2008)Gaussian broadcast channels with receiver message side information., , and . ISIT, page 2472-2476. IEEE, (2009)Erratum to "Local line directional pattern for palmprint recognition" [Pattern Recognit. 50(2016) 26-44]., , , , , , , and . Pattern Recognition, (2017)Tracking Formant Trajectory of Tracheoesophageal Speech Using Hidden Dynamic Model., and . Computer and Information Science, 4 (1): 110-115 (2011)Colorimetric Integrated PCR Protocol for Rapid Detection of Vibrio parahaemolyticus., , , , , , , and . Sensors, 16 (10): 1600 (2016)Nutzung evolutionärer Strategien zur Optimierung des dynamischen Verhaltens von Laborzentrifugen.. Clausthal University of Technology, Clausthal-Zellerfeld, Germany, (2003)Real Time Biped Walking Gait Pattern Generator for a Real Robot., , , and . RoboCup, volume 7416 of Lecture Notes in Computer Science, page 210-221. Springer, (2011)