Wilson, Cheruiyot
33  results:
Search for persons X
?
1

Using Supervised Ensemble Machine Learning Algorithm in the..:

, In: Congress on Smart Computing Technologies; Smart Innovation, Systems and Technologies,
 
?
3

Analysis of Machine-Based Learning Algorithm Used in Named ..:

Mithanga Kamau, Francis ; Ogada, Kennedy ; Wilson Kipruto, Cheruiyot
Informing Science: The International Journal of an Emerging Transdiscipline.  26 (2023)  - p. 069-084 , 2023
 
?
4

A Hybrid Model for Detecting Phishing Attack Using Recommed..:

Ogonji Duncan Eric O ; Wilson Cheruiyot ; Mwangi Waweru
https://www.itm-conferences.org/articles/itmconf/pdf/2023/07/itmconf_icaect2023_01018.pdf.  , 2023
 
?
5

A Hybrid Model for Predicting Missing Records in Data Using..:

, In: 2022 IEEE International Symposium on Product Compliance Engineering - Asia (ISPCE-ASIA),
 
?
10

A survey on security challenges in the current MANET routin..:

Fridah Chepkemoi Korir ; Wilson Cheruiyot
info:eu-repo/semantics/altIdentifier/doi/10.30574/gjeta.2022.12.1.0114.  , 2022
 
?
 
?
 
?
14

MAAMSIC: Multimodal Authentication and Authorization Model ..:

, In: Advances in Intelligent Systems and Computing; Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020),
 
1-15