Your selections:
Multilayer hybrid strategy for phishing email zero-day filtering
- Chowdhury, M. U., Abawajy, J. H., Kelarev, A. V., Hochin, T.
Matrix constructions of centroid sets for classification systems
- Chowdhury, M., Abawajy, J., Jelinek, H. F., Kelarev, A. V., Ryan, J.
Rees semigroups of digraphs for classification of data
- Abawajy, J., Kelarev, A. V., Miller, M., Ryan, J.
Distances of centroid sets in a graph-based construction for information security applications
- Abawajy, J., Kelarev, A. V., Miller, M., Ryan, J.
Incidence semirings of graphs and visible bases
- Abawajy, J., Kelarev, A. V., Miller, M., Ryan, J.
Are you sure you would like to clear your session, including search history and login status?