Vitali Herrera-Semenets

Orcid: 0000-0001-7094-2835

According to our database1, Vitali Herrera-Semenets authored at least 14 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Uncovering phishing attacks using principles of persuasion analysis.
J. Netw. Comput. Appl., 2024

Tax Underreporting Detection Using an Unsupervised Learning Approach.
Proceedings of the Advances in Soft Computing, 2024

Towards a Novel Approach for Knowledge Base Population Using Distant Supervision.
Proceedings of the Pattern Recognition - 16th Mexican Conference, 2024

Unmasking Phishing Attempts: A Study on Detection in Spanish Emails.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2024

2023
A Decision Tree Induction Algorithm for Efficient Rule Evaluation Using Shannon's Expansion.
Proceedings of the Advances in Computational Intelligence, 2023

Towards Automatic Principles of Persuasion Detection Using Machine Learning Approach.
Proceedings of the Progress in Artificial Intelligence and Pattern Recognition, 2023

2022
A lightweight data representation for phishing URLs detection in IoT environments.
Inf. Sci., 2022

A fast instance reduction algorithm for intrusion detection scenarios.
Comput. Electr. Eng., 2022

Red Light/Green Light: A Lightweight Algorithm for, Possibly, Fraudulent Online Behavior Change Detection.
Proceedings of the Advances in Computational Intelligence, 2022

2021
A multi-measure feature selection algorithm for efficacious intrusion detection.
Knowl. Based Syst., 2021

2019
A Framework for Distributed Data Processing.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2019

2018
A data reduction strategy and its application on scan and backscatter detection using rule-based classifiers.
Expert Syst. Appl., 2018

2017
Classification rule-based models for malicious activity detection.
Intell. Data Anal., 2017

A Novel Hybrid Data Reduction Strategy and Its Application to Intrusion Detection.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2017


  Loading...