Your selections:
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
A Grobner-Shirshov Algorithm for Applications in Internet Security
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Ma, Liping, Abawajy, Jemal, Pan, L.
Optimization and matrix constructions for classification of data
- Kelarev, Andrei, Yearwood, John, Vamplew, Peter, Abawajy, Jemal, Chowdhury, Morshed
- Kelarev, Andrei, Stranieri, Andrew, Abawajy, Jemal, Yearwood, John, Jelinek, Herbert
Performance evaluation of multi-tier ensemble classifiers for phishing websites
- Abawajy, Jemal, Beliakov, Gleb, Kelarev, Andrei, Yearwood, John
A data mining application of the incidence semirings
- Abawajy, Jemal, Kelarev, Andrei, Yearwood, John, Turville, Christopher
Hybrids of support vector machine wrapper and filter based framework for malware detection
- Huda, Shamsul, Abawajy, Jemal, Alazab, Mamoun, Abdollahian, Mali, Islam, Rafiqul, Yearwood, John
Hybrids of support vector machine wrapper and filter based framework for malware detection
- Huda, Shamsul, Abawajy, Jemal, Alazab, Mamoun, Abdollalihiand, Mali, Islam, Rafiqul, Yearwood, John
Are you sure you would like to clear your session, including search history and login status?