Comparative analysis of classification algorithms for email spam detection
Shafi’i Muhammad Abdulhamid,
Maryam Shuaib,
Oluwafemi Osho,
Idris Ismaila,
John K. Alhassan
The method of hidden terminal transmission of network attack signatures
Igor Ruban,
Nataliia Lukova-Chuiko,
Vadym Mukhin,
Yaroslav Kornaga,
Igor Grishko,
Anton Smirnov