Your selections:
Applying clustering and ensemble clustering approaches to phishing profiling
- Webb, Dean, Yearwood, John, Vamplew, Peter, Ma, Liping, Ofoghi, Bahadorreza, Kelarev, Andrei
Rees matrix constructions for clustering of data
- Kelarev, Andrei, Watters, Paul, Yearwood, John
Experimental investigation of three machine learning algorithms for ITS dataset
- Yearwood, John, Kang, Byeongho, Kelarev, Andrei
A polynomial ring construction for the classification of data
- Kelarev, Andrei, Yearwood, John, Vamplew, Peter
An algorithm for the optimization of multiple classifers in data mining based on graphs
- Kelarev, Andrei, Ryan, Joe, Yearwood, John
Cayley graphs as classifiers for data mining : The influence of asymmetries
- Kelarev, Andrei, Ryan, Joe, Yearwood, John
Optimization of classifiers for data mining based on combinatorial semigroups
- Kelarev, Andrei, Yearwood, John, Watters, Paul
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
A formula for multiple classifiers in data mining based on Brandt semigroups
- Kelarev, Andrei, Yearwood, John, Mammadov, Musa
Derivative-free optimization and neural networks for robust regression
- Beliakov, Gleb, Kelarev, Andrei, Yearwood, John
Machine learning algorithms for analysis of DNA data sets
- Yearwood, John, Bagirov, Adil, Kelarev, Andrei
An application of novel clustering technique for information security
- Beliakov, Gleb, Yearwood, John, Kelarev, Andrei
Optimization methods and the k-committees algorithm for clustering of sequence data
- Yearwood, John, Bagirov, Adil, Kelarev, Andrei
Consensus clustering and supervised classification for profiling phishing emails in internet commerce security
- Dazeley, Richard, Yearwood, John, Kang, Byeongho, Kelarev, Andrei
Detection of CAN by ensemble classifiers based on Ripple Down rules
- Kelarev, Andrei, Dazeley, Richard, Stranieri, Andrew, Yearwood, John, Jelinek, Herbert
Applications of machine learning for linguistic analysis of texts
- Torney, Rosemary, Yearwood, John, Vamplew, Peter, Kelarev, Andrei
A comparison of machine learning algorithms for multilabel classification of CAN
- Kelarev, Andrei, Stranieri, Andrew, Yearwood, John, Jelinek, Herbert
Application of rank correlation, clustering and classification in information security
- Beliakov, Gleb, Yearwood, John, Kelarev, Andrei
Performance evaluation of multi-tier ensemble classifiers for phishing websites
- Abawajy, Jemal, Beliakov, Gleb, Kelarev, Andrei, Yearwood, John
Rule-based classifiers and meta classifiers for identification of cardiac autonomic neuropathy progression
- Jelinek, Herbert, Kelarev, Andrei, Stranieri, Andrew, Yearwood, John
Are you sure you would like to clear your session, including search history and login status?