default search action
Martin Boldt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Victor Arvidsson, Sadi Alawadi, Martin Boldt, Ola Angelsmark, Fanny Söderlund:
A Novel Approach for Intrusion Detection using Online Federated Learning on Streaming Data. FMEC 2024: 114-121 - [c24]Gustav Nilsson, Martin Boldt, Sadi Alawadi:
The Role of the Data Quality on Model Efficiency: An Exploratory Study on Centralised and Federated Learning. FMEC 2024: 253-260 - 2023
- [c23]Victor Arvidsson, Ahmad Al-Mashahedi, Martin Boldt:
Evaluation of Defense Methods Against the One-Pixel Attack on Deep Neural Networks. SAIS 2023: 49-57 - [c22]Jim Ahlstrand, Martin Boldt, Anton Borg, Håkan Grahn:
Preliminary Results on the use of Artificial Intelligence for Managing Customer Life Cycles. SAIS 2023: 68-76 - [e1]Håkan Grahn, Anton Borg, Martin Boldt:
35th Annual Workshop of the Swedish Artificial Intelligence Society, SAIS 2023, Karlskrona, Sweden, June 12-13, 2023. Linköping Electronic Conference Proceedings 199, Linköping University Electronic Press 2023, ISBN 978-91-8075-274-9 [contents] - 2021
- [j14]Anton Borg, Martin Boldt, Oliver Rosander, Jim Ahlstrand:
E-mail classification with machine learning and word embeddings for improved customer support. Neural Comput. Appl. 33(6): 1881-1902 (2021) - [j13]Martin Boldt, Selim Ickin, Anton Borg, Valentin Kulyk, Jörgen Gustafsson:
Alarm Prediction in Cellular Base Stations Using Data-Driven Methods. IEEE Trans. Netw. Serv. Manag. 18(2): 1925-1933 (2021) - 2020
- [j12]Anton Borg, Martin Boldt:
Using VADER sentiment and SVM for predicting customer response sentiment. Expert Syst. Appl. 162: 113746 (2020) - [j11]Martin Boldt, Anton Borg, Selim Ickin, Jörgen Gustafsson:
Anomaly detection of event sequences using multiple temporal resolutions and Markov chains. Knowl. Inf. Syst. 62(2): 669-686 (2020) - [c21]Anton Borg, Jim Ahlstrand, Martin Boldt:
Improving Corporate Support by Predicting Customer e-Mail Response Time: Experimental Evaluation and a Practical Use Case. ICEIS (Revised Selected Papers) 2020: 100-121 - [c20]Anton Borg, Jim Ahlstrand, Martin Boldt:
Predicting e-Mail Response Time in Corporate Customer Support. ICEIS (1) 2020: 305-314
2010 – 2019
- 2019
- [j10]Martin Boldt, Kaavya Rekanar:
Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies. Int. J. Inf. Secur. Priv. 13(2): 47-66 (2019) - [c19]Anton Borg, Martin Boldt, Johan Svensson:
Using Conformal Prediction for Multi-label Document Classification in e-Mail Support Systems. IEA/AIE 2019: 308-322 - 2018
- [j9]Martin Boldt, Anton Borg, Martin Svensson, Jonas Hildeby:
Predicting burglars' risk exposure and level of pre-crime preparation using crime scene data. Intell. Data Anal. 22(1): 167-190 (2018) - [c18]Martin Boldt, Veselka Boeva, Anton Borg:
Multi-Expert Estimations of Burglars' Risk Exposure and Level of Pre-Crime Preparation Using Coded Crime Scene Data: Work in Progress. EISIC 2018: 77-80 - 2017
- [j8]Fredrik Erlandsson, Piotr Bródka, Martin Boldt, Henric Johnson:
Do We Really Need to Catch Them All? A New User-Guided Social Media Crawling Method. Entropy 19(12): 686 (2017) - [j7]Martin Boldt, Andreas Jacobsson, Dejan Baca, Bengt Carlsson:
Introducing a Novel Security-Enhanced Agile Software Development Process. Int. J. Secur. Softw. Eng. 8(2): 26-52 (2017) - [c17]Anton Borg, Martin Boldt, Johan Eliasson:
Detecting Crime Series Based on Route Estimation and Behavioral Similarity. EISIC 2017: 1-8 - [c16]Martin Boldt, Anton Borg:
A Statistical Method for Detecting Significant Temporal Hotspots Using LISA Statistics. EISIC 2017: 123-126 - [c15]Martin Boldt, Veselka Boeva, Anton Borg:
Multi-expert estimations of burglars' risk exposure and level of pre-crime preparation based on crime scene data. SAIS 2017: 137:004 - [i2]Martin Boldt:
Evaluation of the efficiency and quality in structured crime reports. CoRR abs/1709.03581 (2017) - 2016
- [j6]Andreas Jacobsson, Martin Boldt, Bengt Carlsson:
A risk analysis of a smart home automation system. Future Gener. Comput. Syst. 56: 719-733 (2016) - [j5]Martin Boldt, Anton Borg:
Evaluating Temporal Analysis Methods Using Residential Burglary Data. ISPRS Int. J. Geo Inf. 5(9): 148 (2016) - [j4]Anton Borg, Martin Boldt:
Clustering Residential Burglaries Using Modus Operandi and Spatiotemporal Information. Int. J. Inf. Technol. Decis. Mak. 15(1): 23-42 (2016) - [c14]Martin Boldt, Jaswanth Bala:
Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data. EISIC 2016: 92-95 - [i1]Fredrik Erlandsson, Piotr Bródka, Martin Boldt, Henric Johnson:
Do we really need to catch them all? A new User-guided Social Media Crawling method. CoRR abs/1612.01734 (2016) - 2015
- [c13]Dejan Baca, Martin Boldt, Bengt Carlsson, Andreas Jacobsson:
A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting. ARES 2015: 11-19 - [c12]Fredrik Erlandsson, Roozbeh Nia, Martin Boldt, Henric Johnson, Shyhtsun Felix Wu:
Crawling Online Social Networks. ENIC 2015: 9-16 - [c11]Raja Khurram Shahzad, Mehwish Fatima, Niklas Lavesson, Martin Boldt:
Consensus Decision Making in Random Forests. MOD 2015: 347-358 - 2014
- [j3]Anton Borg, Martin Boldt, Niklas Lavesson, Ulf Melander, Veselka Boeva:
Detecting serial residential burglaries using clustering. Expert Syst. Appl. 41(11): 5252-5266 (2014) - [c10]Andreas Jacobsson, Martin Boldt, Bengt Carlsson:
On the Risk Exposure of Smart Home Automation Systems. FiCloud 2014: 183-190 - 2012
- [c9]Fredrik Erlandsson, Martin Boldt, Henric Johnson:
Privacy Threats Related to User Profiling in Online Social Networks. SocialCom/PASSAT 2012: 838-842 - 2011
- [j2]Niklas Lavesson, Martin Boldt, Paul Davidsson, Andreas Jacobsson:
Learning to detect spyware using end user license agreements. Knowl. Inf. Syst. 26(2): 285-307 (2011) - [c8]Anton Borg, Martin Boldt, Niklas Lavesson:
Informed Software Installation Through License Agreement Categorization. ISSA 2011 - [c7]Anton Borg, Martin Boldt, Bengt Carlsson:
Simulating Malicious Users in a Software Reputation System. STA 2011: 147-156 - 2010
- [b1]Martin Boldt:
Privacy-Invasive Software. Blekinge Institute of Technology, Sweden, 2010 - [c6]Martin Boldt, Anton Borg, Bengt Carlsson:
On the Simulation of a Software Reputation System. ARES 2010: 333-340
2000 – 2009
- 2009
- [j1]Jens Olsson, Martin Boldt:
Computer forensic timeline visualization tool. Digit. Investig. 6(Supplement): S78-S87 (2009) - 2008
- [p1]Niklas Lavesson, Paul Davidsson, Martin Boldt, Andreas Jacobsson:
Spyware Prevention by Classifying End User License Agreements. New Challenges in Applied Intelligence Technologies 2008: 373-382 - 2007
- [c5]Martin Boldt, Bengt Carlsson, Roy Martinsson:
Software Vulnerability Assessment Version Extraction and Verification. ICSEA 2007: 59 - [c4]Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén:
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. Secure Data Management 2007: 142-157 - 2006
- [c3]Martin Boldt, Bengt Carlsson:
Analysing Countermeasures Against Privacy-Invasive Software. ICSEA 2006: 61 - [c2]Martin Boldt, Bengt Carlsson:
Privacy-Invasive Software and Preventive Mechanisms. ICSNC 2006: 21 - 2004
- [c1]Andreas Jacobsson, Martin Boldt, Bengt Carlsson:
Privacy Invasive Software in File-Sharing Tools. International Information Security Workshops 2004: 277-292
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint