Cited By
View all- Shombot EDusserre GBestak RAhmed N(2024)An application for predicting phishing attacks: A case of implementing a support vector machine learning modelCyber Security and Applications10.1016/j.csa.2024.1000362(100036)Online publication date: 2024
- Li JShi JLiu ZFeng C(2023)A parallel and balanced SVM algorithm on spark for data-intensive computingIntelligent Data Analysis10.3233/IDA-22677427:4(1065-1086)Online publication date: 20-Jul-2023
- Zhang JLi XWang L(2023)A Review Selection Method Based on Consumer Decision Phases in E-commerceACM Transactions on Information Systems10.1145/358726542:1(1-27)Online publication date: 21-Aug-2023
- Show More Cited By