From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Link mining applications: progress and challenges.. SIGKDD Explor., 7 (2): 76-83 (2005)On the efficacy of data mining for security applications.. KDD Workshop on CyberSecurity and Intelligence Informatics, стр. 75-83. ACM, (2009)Use of Domain Knowledge to Detect Insider Threats in Computer Activities., , , , и . IEEE Symposium on Security and Privacy Workshops, стр. 60-67. IEEE Computer Society, (2013)Transfer Learning Progress and Potential.. AI Magazine, 32 (1): 84-86 (2011)Introduction to the Special Issue on Innovative Applications of AI.. AI Magazine, 19 (1): 11-12 (1998)Detecting Unknown Insider Threat Scenarios., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 277-288. IEEE Computer Society, (2014)Knowledge Based Systems Technology Applied to Naval Battle Management Decision Aiding., , и . IAAI, AAAI Press, (1989)Countering terrorism through information technology., , , и . Commun. ACM, 47 (3): 36-43 (2004)The Financial Crimes Enforcement Network AI System (FAIS) Identifying Potential Money Laundering from Reports of Large Cash Transactions., , , , , , , , и . AI Magazine, 16 (4): 21-39 (1995)The NASD Regulation Advanced Detection System (ADS)., , , , , и . AAAI/IAAI, стр. 1055-1062. AAAI Press / The MIT Press, (1998)