Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phishing Detection through Email Embeddings., , , , and . CoRR, (2020)ContextMiner: Mining Contextual Features for Conceptualizing Knowledge in Security Texts., and . IEEE Access, (2022)A user-centric threat model and repository for cyber attacks., , , , , and . SAC, page 1341-1346. ACM, (2022)Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks., , , , and . COMPSAC, page 1703-1710. IEEE, (2021)A Concern Analysis of FOMC Statements Comparing The Great Recession and The COVID-19 Pandemic., , , and . CoRR, (2020)Temperature Prediction in Microgrids Using LSTMs: A Case Study., , , and . COMPSAC, page 1237-1242. IEEE, (2022)Predicting Emotions Perceived from Sounds., , , , and . IEEE BigData, page 2057-2064. IEEE, (2020)A Concern Analysis of Federal Reserve Statements: The Great Recession vs. The COVID-19 Pandemic., , , and . IEEE BigData, page 2079-2086. IEEE, (2020)Email Embeddings for Phishing Detection., , , , and . IEEE BigData, page 2087-2092. IEEE, (2020)Fake Reviews Detection through Analysis of Linguistic Features., , , , and . CoRR, (2020)