Zeki Erdem

According to our database1, Zeki Erdem authored at least 22 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Network anomaly detection with deep learning.
Proceedings of the 26th Signal Processing and Communications Applications Conference, 2018

2016
Analyzing medium-size information technology department using social network analysis.
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016

2015
Resilience of Criminal Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling, and Prediction, 2015

Deciding Resilient Criminal Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Understanding Crime Networks: Actors and Links.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

Online Naive Bayes classification for network intrusion detection.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Improved Naïve Bayesian algorithm for author detection.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

A real time data warehouse approach for data processing.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

Which crime features are important for criminal network members?
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Detecting criminal networks: SNA models are compared to proprietary models.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Detecting Criminal Networks Using Social Similarity.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Specific Similarity Measure for Terrorist Networks: How Much Similar Are Terrorist Networks of Turkey?
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

Incorporating data sources and methodologies for crime data mining.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

How Much Similar Are Terrorists Networks of Istanbul?
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
Combined Detection Model for Criminal Network Detection.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Comparison of Feature-Based Criminal Network Detection Models with k-Core and n-Clique.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

2009
Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

Prediction of past unsolved terrorist attacks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

2008
Comparing Two Models for Terrorist Group Detection: GDM or OGDM?.
Proceedings of the Intelligence and Security Informatics, 2008

2005
Ensemble of SVMs for Incremental Learning.
Proceedings of the Multiple Classifier Systems, 6th International Workshop, 2005

Classification of Volatile Organic Compounds with Incremental SVMs and RBF Networks.
Proceedings of the Computer and Information Sciences, 2005

Reducing the Effect of Out-Voting Problem in Ensemble Based Incremental Support Vector Machines.
Proceedings of the Artificial Neural Networks: Formal Models and Their Applications, 2005


  Loading...