Your selections:
Hybrids of support vector machine wrapper and filter based framework for malware detection
- Huda, Shamsul, Abawajy, Jemal, Alazab, Mamoun, Abdollahian, Mali, Islam, Rafiqul, Yearwood, John
Hybrids of support vector machine wrapper and filter based framework for malware detection
- Huda, Shamsul, Abawajy, Jemal, Alazab, Mamoun, Abdollalihiand, Mali, Islam, Rafiqul, Yearwood, John
A data mining application of the incidence semirings
- Abawajy, Jemal, Kelarev, Andrei, Yearwood, John, Turville, Christopher
- Kelarev, Andrei, Stranieri, Andrew, Abawajy, Jemal, Yearwood, John, Jelinek, Herbert
Performance evaluation of multi-tier ensemble classifiers for phishing websites
- Abawajy, Jemal, Beliakov, Gleb, Kelarev, Andrei, Yearwood, John
A Grobner-Shirshov Algorithm for Applications in Internet Security
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Ma, Liping, Abawajy, Jemal, Pan, L.
Optimization and matrix constructions for classification of data
- Kelarev, Andrei, Yearwood, John, Vamplew, Peter, Abawajy, Jemal, Chowdhury, Morshed
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
Are you sure you would like to clear your session, including search history and login status?