Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Risk Data Repository: A Novel Approach to Security Risk Modelling., , and . SEC, volume A-37 of IFIP Transactions, page 185-194. North-Holland, (1993)The truth is in there: current issues in extracting rules from trained feedforward artificial neural networks., , , and . ICNN, page 2530-2534. IEEE, (1997)Quo Vadis? Reliable and Practical Rule Extraction from Neural Networks., , and . Advances in Machine Learning I, volume 262 of Studies in Computational Intelligence, Springer, (2010)Lessons from Past, Current Issues, and Future Research Directions in Extracting the Knowledge Embedded in Artificial Neural Networks, , , , and . volume 1778 of LNCS, page 226--239. Springer, Berlin, Germany, (2000)Extracting rules for grammar recognition from Cascade-2 networks., , and . Learning for Natural Language Processing, volume 1040 of Lecture Notes in Computer Science, page 48-60. Springer, (1995)Survey and critique of techniques for extracting rules from trained artificial neural networks., , and . Knowl. Based Syst., 8 (6): 373-389 (1995)A Methodology for Describing Information and Physical Security Architectures., , and . SEC, volume A-15 of IFIP Transactions, page 277-296. North-Holland, (1992)Implications of the tax file number legislation for computer professionals., , , and . Aust. Comput. J., 22 (1): 11-20 (1990)KARDS: Hybrid Knowledge Acquisition for a Security Risk Model., , , and . IEA/AIE, page 501-506. ACM, (1995)Artificial Intelligence Meets Artificial Insemination: An Application of Rule Extraction from Neural Networks., , , , and . IEA/AIE, page 87-92. ACM, (1995)