Martin Boldt

Orcid: 0000-0002-9316-4842

According to our database1, Martin Boldt authored at least 43 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Automated Generation of CCTV Camera Coverage Areas for Smart Cities Using Line-of-Sight Analysis.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

The Role of the Data Quality on Model Efficiency: An Exploratory Study on Centralised and Federated Learning.
Proceedings of the 2024 9th International Conference on Fog and Mobile Edge Computing (FMEC), 2024

A Novel Approach for Intrusion Detection using Online Federated Learning on Streaming Data.
Proceedings of the 2024 9th International Conference on Fog and Mobile Edge Computing (FMEC), 2024

2023
Evaluation of Defense Methods Against the One-Pixel Attack on Deep Neural Networks.
Proceedings of the 35th Annual Workshop of the Swedish Artificial Intelligence Society, 2023

Preliminary Results on the use of Artificial Intelligence for Managing Customer Life Cycles.
Proceedings of the 35th Annual Workshop of the Swedish Artificial Intelligence Society, 2023

2021
Alarm Prediction in Cellular Base Stations Using Data-Driven Methods.
IEEE Trans. Netw. Serv. Manag., 2021

E-mail classification with machine learning and word embeddings for improved customer support.
Neural Comput. Appl., 2021

2020
Anomaly detection of event sequences using multiple temporal resolutions and Markov chains.
Knowl. Inf. Syst., 2020

Using VADER sentiment and SVM for predicting customer response sentiment.
Expert Syst. Appl., 2020

Improving Corporate Support by Predicting Customer e-Mail Response Time: Experimental Evaluation and a Practical Use Case.
Proceedings of the Enterprise Information Systems - 22nd International Conference, 2020

Predicting e-Mail Response Time in Corporate Customer Support.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

2019
Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies.
Int. J. Inf. Secur. Priv., 2019

Using Conformal Prediction for Multi-label Document Classification in e-Mail Support Systems.
Proceedings of the Advances and Trends in Artificial Intelligence. From Theory to Practice, 2019

2018
Predicting burglars' risk exposure and level of pre-crime preparation using crime scene data.
Intell. Data Anal., 2018

Multi-Expert Estimations of Burglars' Risk Exposure and Level of Pre-Crime Preparation Using Coded Crime Scene Data: Work in Progress.
Proceedings of the European Intelligence and Security Informatics Conference, 2018

2017
Introducing a Novel Security-Enhanced Agile Software Development Process.
Int. J. Secur. Softw. Eng., 2017

Do We Really Need to Catch Them All? A New User-Guided Social Media Crawling Method.
Entropy, 2017

Evaluation of the efficiency and quality in structured crime reports.
CoRR, 2017

Multi-expert estimations of burglars' risk exposure and level of pre-crime preparation based on crime scene data.
Proceedings of the 30th Annual Workshop of the Swedish Artificial Intelligence Society, 2017

Detecting Crime Series Based on Route Estimation and Behavioral Similarity.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

A Statistical Method for Detecting Significant Temporal Hotspots Using LISA Statistics.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

2016
Clustering Residential Burglaries Using Modus Operandi and Spatiotemporal Information.
Int. J. Inf. Technol. Decis. Mak., 2016

Evaluating Temporal Analysis Methods Using Residential Burglary Data.
ISPRS Int. J. Geo Inf., 2016

A risk analysis of a smart home automation system.
Future Gener. Comput. Syst., 2016

Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2015
Consensus Decision Making in Random Forests.
Proceedings of the Machine Learning, Optimization, and Big Data, 2015

Crawling Online Social Networks.
Proceedings of the 2015 Second European Network Intelligence Conference, 2015

A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Detecting serial residential burglaries using clustering.
Expert Syst. Appl., 2014

On the Risk Exposure of Smart Home Automation Systems.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2012
Privacy Threats Related to User Profiling in Online Social Networks.
Proceedings of the 2012 International Conference on Privacy, 2012

2011
Learning to detect spyware using end user license agreements.
Knowl. Inf. Syst., 2011

Simulating Malicious Users in a Software Reputation System.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Informed Software Installation Through License Agreement Categorization.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
Privacy-Invasive Software.
PhD thesis, 2010

On the Simulation of a Software Reputation System.
Proceedings of the ARES 2010, 2010

2009
Computer forensic timeline visualization tool.
Digit. Investig., 2009

2008
Spyware Prevention by Classifying End User License Agreements.
Proceedings of the New Challenges in Applied Intelligence Technologies, 2008

2007
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Software Vulnerability Assessment Version Extraction and Verification.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007

2006
Privacy-Invasive Software and Preventive Mechanisms.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Analysing Countermeasures Against Privacy-Invasive Software.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

2004
Privacy Invasive Software in File-Sharing Tools.
Proceedings of the Information Security Management, Education and Privacy, 2004


  Loading...