There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Background: In genetic transcription research, gene expression is typically reported in a test sample relative to a reference sample. Laboratory assays that measure gene expressio...
Abstract In this survey, the currently available ultrawideband-based non-line-of-sight (NLOS) identification and error mitigation methods are presented. They are classified into se...
Jasurbek Khodjaev, Yongwan Park, Aamir Saeed Malik