Identifying social networks of programmers using text mining for code similarity detection | 0 | 0.34 | 2020 |
Visualization of repeated patterns in multivariate discrete sequences | 0 | 0.34 | 2020 |
A password creation and validation system for social media platforms based on big data analytics | 0 | 0.34 | 2020 |
Multivariate motif detection in local weather big data. | 0 | 0.34 | 2019 |
Text mining for malware classification using multivariate all repeated patterns detection. | 0 | 0.34 | 2019 |
The role of social media surveillance in search and rescue missions. | 0 | 0.34 | 2019 |
Detecting Hate Speech Within the Terrorist Argument: A Greek Case. | 0 | 0.34 | 2018 |
Text Mining for Plagiarism Detection: Multivariate Pattern Detection for Recognition of Text Similarities. | 0 | 0.34 | 2018 |
Clickstream Analytics: An Experimental Analysis of the Amazon Users' Simulated Monthly Traffic. | 0 | 0.34 | 2018 |
Learn by playing: A serious war game simulation for teaching military ethics. | 0 | 0.34 | 2017 |
Are We Really That Close Together? Tracing and Discussing Similarities and Differences between Greek Terrorist Groups Using Cluster Analysis | 0 | 0.34 | 2017 |
Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics Analytics | 0 | 0.34 | 2017 |
Advanced Network Data Analytics for Large-Scale DDoS Attack Detection | 0 | 0.34 | 2017 |
Frequent and non-frequent pattern detection in big data streams: An experimental simulation in 1 trillion data points. | 0 | 0.34 | 2016 |
Repeated patterns detection in big data using classification and parallelism on LERP Reduced Suffix Arrays. | 4 | 0.39 | 2016 |
Profiling individuals based on email analysis and ego networks: A visualization technique. | 0 | 0.34 | 2016 |
Sequential All Frequent Itemsets Detection: A Method to Detect All Frequent Sequential Itemsets Using LERP-Reduced Suffix Array Data Structure and ARPaD Algorithm. | 2 | 0.37 | 2015 |
Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series. | 0 | 0.34 | 2015 |
Tactics, weapons, targets and rationale behind the actions of the mostly operational terrorist groups across Europe. | 0 | 0.34 | 2015 |
Early DDoS Detection Based on Data Mining Techniques | 2 | 0.38 | 2014 |
Analyzing very large time series using suffix arrays | 9 | 0.51 | 2014 |
Fast Frequent Pattern Detection Using Prime Numbers | 0 | 0.34 | 2014 |
Experimental Analysis on the Normality of π, e, φ, sqrt(2) Using Advanced Data-Mining Techniques. | 0 | 0.34 | 2014 |
Visualization of health indicators: utilizing data mining techniques and statistical analysis for effective comparison of user profiles. | 0 | 0.34 | 2014 |
Combining information extraction and text mining for cancer biomarker detection | 0 | 0.34 | 2013 |
Modeling Suspicious Email Detection Using Enhanced Feature Selection | 3 | 0.61 | 2013 |
The reduction of the digital divide by improving the appropriateness of the web content. | 0 | 0.34 | 2012 |
Finding Hidden Nodes by Checking for Missing Nodes against Past Social Networks | 1 | 0.35 | 2012 |
Periodicity data mining in time series using Suffix Arrays. | 4 | 0.42 | 2012 |
A Hybrid Framework for Building a Web-Page Recommender System | 0 | 0.34 | 2011 |
CCM: A Text Classification Model by Clustering | 2 | 0.37 | 2011 |
Simple and effective behavior tracking by post processing of association rules into segments | 0 | 0.34 | 2011 |
Effectiveness Of Heuristic Based Approach On The Performance Of Indexing And Clustering Of High Dimensional Data | 0 | 0.34 | 2011 |
Harvesting Information from Heterogeneous Sources | 1 | 0.37 | 2011 |
heteroHarvest: Harvesting information from heterogeneous sources | 0 | 0.34 | 2011 |
Mapping rules for converting from ODL to XML schemas | 1 | 0.35 | 2010 |
Heuristic based approach to clustering and its time critical applications | 0 | 0.34 | 2010 |
Detecting New Trends in Terrorist Networks | 0 | 0.34 | 2010 |
Designing Universally Accessible Networking Services for a Mobile Personal Assistant | 1 | 0.40 | 2009 |
Web User Interface Design Strategy: Designing for Device Independence | 4 | 0.50 | 2009 |
A New Algorithm for On-Line Multivariate ARMA Identification Using Multimodel Partitioning Theory | 0 | 0.34 | 2008 |
Usability Inspection of the WardInHand Prototype | 0 | 0.34 | 2005 |