3C TIC. Cuadernos de desarrollo aplicados a las TIC. ISSN: 2254 – 6529 Ed. 40 Vol. 11 N.º 1 Marzo - Junio 2022
265 https://doi.org/10.17993/3ctic.2022.111.251-267
Mujtaba, G., Tahir, M., & Soomro, M. H. (2019). Energy ecient data encryption techniques in
smartphones. Wireless Personal Communications, 106(4), 2023-2035. https://link.springer.com/arti-
cle/10.1007/s11277-018-5920-1
Murtagh, F. (1991). Multilayer perceptrons for classication and regression. Neurocomputing, 2(5-6), 183-
197. https://pure.hud.ac.uk/en/publications/multilayer-perceptrons-for-classication-and-re-
gression
Prentzas, N., Nicolaides, A., Kyriacou, E., Kakas, A., & Pattichis, C. (2019). Integrating ma-
chine learning with symbolic reasoning to build an explainable AI model for stroke prediction.
In 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE) (pp. 817-821).
IEEE. https://ieeexplore.ieee.org/document/8941679
Rathi, M., & Pareek, V. (2013). Spam mail detection through data mining-A comparative performan-
ce analysis. International Journal of Modern Education and Computer Science, 5(12), 31. https://www.
mecs-press.org/ijmecs/ijmecs-v5-n12/v5n12-5.html
Van Huynh, T., Van Nguyen, K., Nguyen, N. L. T., & Nguyen, A. G. T. (2020). Job prediction: From
deep neural network models to applications. In 2020 RIVF International Conference on Computing and
Communication Technologies (RIVF) (pp. 1-6). IEEE. https://ieeexplore.ieee.org/document/9140760
Vidros, S., Kolias, C., Kambourakis, G., & Akoglu, L. (2017). Automatic detection of online re-
cruitment frauds: Characteristics, methods, and a public dataset. Future Internet, 9(1), 6. https://
www.mdpi.com/1999-5903/9/1/6
Ward, A., Gbadebo, A., & Baruah, B. (2015). Using job advertisements to inform curricula design
for the key global technical challenges. In 2015 International Conference on Information Technology Based
Higher Education and Training (ITHET) (pp. 1-6). IEEE. https://ieeexplore.ieee.org/abstract/docu-
ment/7218042