Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Unknown Insider Threat Scenarios., , , and . IEEE Symposium on Security and Privacy Workshops, page 277-288. IEEE Computer Society, (2014)The NASD Regulation Advanced Detection System (ADS)., , , , , and . AAAI/IAAI, page 1055-1062. AAAI Press / The MIT Press, (1998)Using relational knowledge discovery to prevent securities fraud., , , , , and . KDD, page 449-458. ACM, (2005)Use of Domain Knowledge to Detect Insider Threats in Computer Activities., , , , and . IEEE Symposium on Security and Privacy Workshops, page 60-67. IEEE Computer Society, (2013)The NASD Securities Observation, New Analysis and Regulation System (SONAR)., , , , and . IAAI, page 11-18. AAAI, (2003)Restructuring Databases for Knowledge Discovery by Consolidation and Link Formation., and . KDD, page 136-141. AAAI Press, (1995)Explaining and Aggregating Anomalies to Detect Insider Threats., , , and . HICSS, page 2739-2748. IEEE Computer Society, (2016)Relational data pre-processing techniques for improved securities fraud detection., , , , , , and . KDD, page 941-949. ACM, (2007)Insider Threat Detection in PRODIGAL., , , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of Large Cash Transactions., , , , , , , , and . IAAI, page 156-170. AAAI Press, (1995)