Martin Boldt

According to our database1, Martin Boldt authored at least 26 papers between 2004 and 2018.

Collaborative distances :
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Predicting burglars' risk exposure and level of pre-crime preparation using crime scene data.
Intell. Data Anal., 2018

2017
Introducing a Novel Security-Enhanced Agile Software Development Process.
IJSSE, 2017

Do We Really Need to Catch Them All? A New User-Guided Social Media Crawling Method.
Entropy, 2017

Evaluation of the efficiency and quality in structured crime reports.
CoRR, 2017

Detecting Crime Series Based on Route Estimation and Behavioral Similarity.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

A Statistical Method for Detecting Significant Temporal Hotspots Using LISA Statistics.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

2016
Clustering Residential Burglaries Using Modus Operandi and Spatiotemporal Information.
International Journal of Information Technology and Decision Making, 2016

Evaluating Temporal Analysis Methods Using Residential Burglary Data.
ISPRS Int. J. Geo-Information, 2016

A risk analysis of a smart home automation system.
Future Generation Comp. Syst., 2016

Do we really need to catch them all? A new User-guided Social Media Crawling method.
CoRR, 2016

Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2015
Consensus Decision Making in Random Forests.
Proceedings of the Machine Learning, Optimization, and Big Data, 2015

Crawling Online Social Networks.
Proceedings of the 2015 Second European Network Intelligence Conference, 2015

A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Detecting serial residential burglaries using clustering.
Expert Syst. Appl., 2014

On the Risk Exposure of Smart Home Automation Systems.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2012
Privacy Threats Related to User Profiling in Online Social Networks.
Proceedings of the 2012 International Conference on Privacy, 2012

2011
Learning to detect spyware using end user license agreements.
Knowl. Inf. Syst., 2011

Informed Software Installation Through License Agreement Categorization.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
On the Simulation of a Software Reputation System.
Proceedings of the ARES 2010, 2010

2008
Spyware Prevention by Classifying End User License Agreements.
Proceedings of the New Challenges in Applied Intelligence Technologies, 2008

2007
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Software Vulnerability Assessment Version Extraction and Verification.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007

2006
Privacy-Invasive Software and Preventive Mechanisms.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Analysing Countermeasures Against Privacy-Invasive Software.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

2004
Privacy Invasive Software in File-Sharing Tools.
Proceedings of the Information Security Management, Education and Privacy, 2004


  Loading...