2025
Using Transformers for B2B Contractual Churn Prediction Based on Customer Behavior Data.
Proceedings of the 27th International Conference on Enterprise Information Systems, 2025
2024
Automated Generation of CCTV Camera Coverage Areas for Smart Cities Using Line-of-Sight Analysis.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Predicting B2B Customer Churn using a Time Series Approach.
Proceedings of the Fifth International Conference on Intelligent Data Science Technologies and Applications, 2024
The Role of the Data Quality on Model Efficiency: An Exploratory Study on Centralised and Federated Learning.
Proceedings of the 2024 9th International Conference on Fog and Mobile Edge Computing (FMEC), 2024
A Novel Approach for Intrusion Detection using Online Federated Learning on Streaming Data.
Proceedings of the 2024 9th International Conference on Fog and Mobile Edge Computing (FMEC), 2024
2023
Evaluation of Defense Methods Against the One-Pixel Attack on Deep Neural Networks.
Proceedings of the 35th Annual Workshop of the Swedish Artificial Intelligence Society, 2023
Preliminary Results on the use of Artificial Intelligence for Managing Customer Life Cycles.
Proceedings of the 35th Annual Workshop of the Swedish Artificial Intelligence Society, 2023
2021
Alarm Prediction in Cellular Base Stations Using Data-Driven Methods.
IEEE Trans. Netw. Serv. Manag., 2021
E-mail classification with machine learning and word embeddings for improved customer support.
Neural Comput. Appl., 2021
2020
Anomaly detection of event sequences using multiple temporal resolutions and Markov chains.
Knowl. Inf. Syst., 2020
Using VADER sentiment and SVM for predicting customer response sentiment.
Expert Syst. Appl., 2020
Improving Corporate Support by Predicting Customer e-Mail Response Time: Experimental Evaluation and a Practical Use Case.
Proceedings of the Enterprise Information Systems - 22nd International Conference, 2020
Predicting e-Mail Response Time in Corporate Customer Support.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020
2019
Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies.
Int. J. Inf. Secur. Priv., 2019
Using Conformal Prediction for Multi-label Document Classification in e-Mail Support Systems.
Proceedings of the Advances and Trends in Artificial Intelligence. From Theory to Practice, 2019
2018
Predicting burglars' risk exposure and level of pre-crime preparation using crime scene data.
Intell. Data Anal., 2018
Multi-Expert Estimations of Burglars' Risk Exposure and Level of Pre-Crime Preparation Using Coded Crime Scene Data: Work in Progress.
Proceedings of the European Intelligence and Security Informatics Conference, 2018
2017
Introducing a Novel Security-Enhanced Agile Software Development Process.
Int. J. Secur. Softw. Eng., 2017
Do We Really Need to Catch Them All? A New User-Guided Social Media Crawling Method.
Entropy, 2017
Evaluation of the efficiency and quality in structured crime reports.
CoRR, 2017
Multi-expert estimations of burglars' risk exposure and level of pre-crime preparation based on crime scene data.
Proceedings of the 30th Annual Workshop of the Swedish Artificial Intelligence Society, 2017
Detecting Crime Series Based on Route Estimation and Behavioral Similarity.
Proceedings of the European Intelligence and Security Informatics Conference, 2017
A Statistical Method for Detecting Significant Temporal Hotspots Using LISA Statistics.
Proceedings of the European Intelligence and Security Informatics Conference, 2017
2016
Clustering Residential Burglaries Using Modus Operandi and Spatiotemporal Information.
Int. J. Inf. Technol. Decis. Mak., 2016
Evaluating Temporal Analysis Methods Using Residential Burglary Data.
ISPRS Int. J. Geo Inf., 2016
A risk analysis of a smart home automation system.
Future Gener. Comput. Syst., 2016
Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
2015
Consensus Decision Making in Random Forests.
Proceedings of the Machine Learning, Optimization, and Big Data, 2015
Crawling Online Social Networks.
Proceedings of the 2015 Second European Network Intelligence Conference, 2015
A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Detecting serial residential burglaries using clustering.
Expert Syst. Appl., 2014
On the Risk Exposure of Smart Home Automation Systems.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014
2012
Privacy Threats Related to User Profiling in Online Social Networks.
Proceedings of the 2012 International Conference on Privacy, 2012
2011
Learning to detect spyware using end user license agreements.
Knowl. Inf. Syst., 2011
Simulating Malicious Users in a Software Reputation System.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Informed Software Installation Through License Agreement Categorization.
Proceedings of the Information Security South Africa Conference 2011, 2011
2010
Privacy-Invasive Software.
PhD thesis, 2010
On the Simulation of a Software Reputation System.
Proceedings of the ARES 2010, 2010
2009
Computer forensic timeline visualization tool.
Digit. Investig., 2009
2008
Spyware Prevention by Classifying End User License Agreements.
Proceedings of the New Challenges in Applied Intelligence Technologies, 2008
2007
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
Software Vulnerability Assessment Version Extraction and Verification.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007
2006
Privacy-Invasive Software and Preventive Mechanisms.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Analysing Countermeasures Against Privacy-Invasive Software.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006
2004
Privacy Invasive Software in File-Sharing Tools.
Proceedings of the Information Security Management, Education and Privacy, 2004