Author of the publication

The NASD Regulation Advanced Detection System (ADS).

, , , , , and . AAAI/IAAI, page 1055-1062. AAAI Press / The MIT Press, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the efficacy of data mining for security applications.. KDD Workshop on CyberSecurity and Intelligence Informatics, page 75-83. ACM, (2009)Link mining applications: progress and challenges.. SIGKDD Explor., 7 (2): 76-83 (2005)Use of Domain Knowledge to Detect Insider Threats in Computer Activities., , , , and . IEEE Symposium on Security and Privacy Workshops, page 60-67. IEEE Computer Society, (2013)Transfer Learning Progress and Potential.. AI Magazine, 32 (1): 84-86 (2011)Introduction to the Special Issue on Innovative Applications of AI.. AI Magazine, 19 (1): 11-12 (1998)Detecting Unknown Insider Threat Scenarios., , , and . IEEE Symposium on Security and Privacy Workshops, page 277-288. IEEE Computer Society, (2014)Knowledge Based Systems Technology Applied to Naval Battle Management Decision Aiding., , and . IAAI, AAAI Press, (1989)Countering terrorism through information technology., , , and . Commun. ACM, 47 (3): 36-43 (2004)The Financial Crimes Enforcement Network AI System (FAIS) Identifying Potential Money Laundering from Reports of Large Cash Transactions., , , , , , , , and . AI Magazine, 16 (4): 21-39 (1995)The NASD Regulation Advanced Detection System (ADS)., , , , , and . AAAI/IAAI, page 1055-1062. AAAI Press / The MIT Press, (1998)