Alexey A. Tselykh

According to our database1, Alexey A. Tselykh authored at least 12 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An IoT and Blockchain-based approach for the smart water management system in agriculture.
Expert Syst. J. Knowl. Eng., May, 2023

2022
Throughput optimization of interference limited cognitive radio-based Internet of Things (CR-IoT) network.
J. King Saud Univ. Comput. Inf. Sci., 2022

Knowledge-oriented methodologies for causal inference relations using fuzzy cognitive maps: A systematic review.
Comput. Ind. Eng., 2022

Enabling smart agriculture by implementing artificial intelligence and embedded sensing.
Comput. Ind. Eng., 2022

2021
Applications of Artificial Intelligence in Evolution of Smart Cities and Societies.
Informatica (Slovenia), 2021

2016
An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

2015
Web service for detecting credit card fraud in near real-time.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

A graph-based data mining approach to preventing financial fraud: a case study.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Application of cluster analysis for the assessment of the share of fraud victims among bank card holders.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2013
Generalized approach to modeling user activity graphs for network security and public safety monitoring.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

A clique-based method for mining fuzzy graph patterns in anti-money laundering systems.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2011
Evaluating Operational Risk Exposure Using Fuzzy umber Approach to Scenario Analysis.
Proceedings of the 7th conference of the European Society for Fuzzy Logic and Technology, 2011


  Loading...