Your selections:
Establishing phishing provenance using orthographic features
- Liping, Ma, Yearwood, John, Watters, Paul
A hybrid clustering algorithm using two level of abstraction
- Ghosh, Ranadhir, Mammadov, Musa, Ghosh, Moumita, Yearwood, John
A CAD system using clustering and novel feature extraction technique
- Ghosh, Ranadhir, Ghosh, Moumita, Yearwood, John
An experiment in task decomposition and ensembling for a modular artificial neural network
- Ferguson, Brent, Ghosh, Ranadhir, Yearwood, John
Two level clustering using SOM and dynamical systems
- Ghosh, Ranadhir, Mammadov, Musa, Ghosh, Moumita, Yearwood, John
An application of novel clustering technique for information security
- Beliakov, Gleb, Yearwood, John, Kelarev, Andrei
Are you sure you would like to clear your session, including search history and login status?