Author of the publication

On the Detection and Analysis of VAT Carousel Crime.

, , , , and . JURIX, volume 235 of Frontiers in Artificial Intelligence and Applications, page 130-134. IOS Press, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction and Querying of Relational Schema for Ontology Instances Data., and . OTM Workshops, volume 5333 of Lecture Notes in Computer Science, page 36-37. Springer, (2008)Knowledge-based Highly-specialized Terrorist Event Extraction., , , and . RuleML (2), volume 1004 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)The SDL Library: Querying a Relational Database with an Ontology, Rules and the Jess Engine., , and . RuleML America (2), volume 799 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)Application of an Ontology-Based and Rule-Based Model to Selected Economic Crimes: Fraudulent Disbursement and Money Laundering., , and . RuleML, volume 6403 of Lecture Notes in Computer Science, page 210-224. Springer, (2010)On the Detection and Analysis of VAT Carousel Crime., , , , and . JURIX, volume 235 of Frontiers in Artificial Intelligence and Applications, page 130-134. IOS Press, (2011)An efficient SQL-based querying method to RDF schemata., and . Control. Cybern., 38 (1): 193-213 (2009)Link Analysis of Fuel Laundering Scams and Implications of Results for Scheme Understanding and Prosecutor Strategy., , and . JURIX, volume 205 of Frontiers in Artificial Intelligence and Applications, page 79-88. IOS Press, (2009)Application of the SDL Library to Reveal Legal Sanctions for Crime Perpetrators in Selected Economic Crimes: Fraudulent Disbursement and Money Laundering., , and . RuleML Challenge, volume 649 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)Semantic Extraction with Use of Frames., , , and . PolTAL, volume 8686 of Lecture Notes in Computer Science, page 208-215. Springer, (2014)Identifying Fraudulent Shipments through Matching Shipping Documents with Phone Records., , and . MISSI, volume 183 of Advances in Intelligent Systems and Computing, page 189-198. Springer, (2012)