Alexander N. Tselykh

Orcid: 0000-0001-6956-5315

Affiliations:
  • Southern Federal University, Rostov-on-Don, Russia


According to our database1, Alexander N. Tselykh authored at least 12 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Knowledge-oriented methodologies for causal inference relations using fuzzy cognitive maps: A systematic review.
Comput. Ind. Eng., 2022

Enabling smart agriculture by implementing artificial intelligence and embedded sensing.
Comput. Ind. Eng., 2022

Influence control method on directed weighted signed graphs with deterministic causality.
Ann. Oper. Res., 2022

2020
Assessment of influence productivity in cognitive models.
Artif. Intell. Rev., 2020

2019
Management of Control Impacts Based on Maximizing the Spread of Influence.
Int. J. Autom. Comput., 2019

Managing influence in complex systems to ensure safety of their operation.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Knowledge discovery model based on the effective control theory for decision support systems.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

2018
Knowledge discovery using maximization of the spread of influence in an expert system.
Expert Syst. J. Knowl. Eng., 2018

2016
An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

2015
A graph-based data mining approach to preventing financial fraud: a case study.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Application of cluster analysis for the assessment of the share of fraud victims among bank card holders.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2013
Generalized approach to modeling user activity graphs for network security and public safety monitoring.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013


  Loading...