A risk analysis of a smart home automation system A Jacobsson, M Boldt, B Carlsson Future Generation Computer Systems 56, 719-733, 2016 | 330 | 2016 |
Computer forensic timeline visualization tool J Olsson, M Boldt Digital Investigation 6, S78-S87, 2009 | 120 | 2009 |
Using VADER sentiment and SVM for predicting customer response sentiment A Borg, M Boldt Expert Systems with Applications 162, 113746, 2020 | 102 | 2020 |
Learning to detect spyware using end user license agreements N Lavesson, M Boldt, P Davidsson, A Jacobsson Knowledge and Information Systems 26, 285-307, 2011 | 52 | 2011 |
Detecting serial residential burglaries using clustering A Borg, M Boldt, N Lavesson, U Melander, V Boeva Expert Systems with Applications 41 (11), 5252-5266, 2014 | 50 | 2014 |
A novel security-enhanced agile software development process applied in an industrial setting D Baca, M Boldt, B Carlsson, A Jacobsson 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 49 | 2015 |
Crawling online social networks F Erlandsson, R Nia, M Boldt, H Johnson, SF Wu 2015 Second European Network Intelligence Conference, 9-16, 2015 | 41 | 2015 |
Privacy threats related to user profiling in online social networks F Erlandsson, M Boldt, H Johnson 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 37 | 2012 |
On the Risk Exposure of Smart Home Automation Systems A Jacobsson, M Boldt, B Carlsson International Conference on Future Internet of Things and Cloud (FiCloud), 2014 | 31 | 2014 |
Application whitelisting: approaches and challenges H Pareek, S Romana, PRL Eswari International Journal of Computer Science, Engineering and Information …, 2012 | 31 | 2012 |
Exploring spyware effects M Boldt, A Jacobsson, B Carlsson The 9th Nordic Workshop on Secure IT-systems (NordSec), 2004 | 29 | 2004 |
Privacy-invasive software and preventive mechanisms M Boldt, B Carlsson International Conference on Systems and Networks Communications (ICSNC), 21-21, 2006 | 26 | 2006 |
Evaluating temporal analysis methods using residential burglary data M Boldt, A Borg ISPRS International Journal of Geo-Information 5 (9), 148, 2016 | 24 | 2016 |
E-mail classification with machine learning and word embeddings for improved customer support A Borg, M Boldt, O Rosander, J Ahlstrand Neural Computing and Applications 33 (6), 1881-1902, 2021 | 21 | 2021 |
Clustering Residential Burglaries Using Modus Operandi and Spatiotemporal Information A Borg, M Boldt International Journal of Information Technology & Decision Making, 2015 | 17 | 2015 |
Privacy-Invasive Software in Filesharing Tools A Jacobsson, M Boldt, B Carlsson Information Security Management, Education and Privacy: IFIP 18th World …, 2004 | 16 | 2004 |
Automated spyware detection using end user license agreements M Boldt, A Jacobsson, N Lavesson, P Davidsson 2008 International Conference on Information Security and Assurance (isa …, 2008 | 15 | 2008 |
Anomaly detection of event sequences using multiple temporal resolutions and Markov chains M Boldt, A Borg, S Ickin, J Gustafsson Knowledge and Information Systems 62 (2), 669-686, 2020 | 12 | 2020 |
Software Vulnerability Assessment Version Extraction and Verification M Boldt, B Carlsson, R Martinsson International Conference on Software Engineering Advances (ICSEA 2007), 59-59, 2007 | 12 | 2007 |
Analysing privacy-invasive software using computer forensic methods M Boldt, B Carlsson Proceedings of the International Conference on Systems and Networks …, 2006 | 12 | 2006 |