Multilayer hybrid strategy for phishing email zero-day filtering
Chowdhury, M. U., Abawajy, J. H., Kelarev, A. V., Hochin, T.
Rees semigroups of digraphs for classification of data
Abawajy, J., Kelarev, A. V., Miller, M., Ryan, J.
Incidence semirings of graphs and visible bases
Distances of centroid sets in a graph-based construction for information security applications
Matrix constructions of centroid sets for classification systems
Chowdhury, M., Abawajy, J., Jelinek, H. F., Kelarev, A. V., Ryan, J.
Are you sure you would like to clear your session, including search history and login status?