Anton Borg
Cited by
Cited by
Finding Influential Users in Social Media Using Association Rule Learning
F Erlandsson, P Bródka, A Borg, H Johnson
Entropy 18 (5), 164, 2016
Using VADER sentiment and SVM for predicting customer response sentiment
A Borg, M Boldt
Expert Systems with Applications 162, 113746, 2020
Detecting serial residential burglaries using clustering
A Borg, M Boldt, N Lavesson, U Melander, V Boeva
Expert Systems with Applications 41 (11), 5252-5266, 2014
Crime hotspots: An evaluation of the KDE spatial mapping technique
E Johansson, C Gĺhlin, A Borg
2015 European Intelligence and Security Informatics Conference, 69-74, 2015
Evaluating Temporal Analysis Methods Using Residential Burglary Data
M Boldt, A Borg
ISPRS International Journal of Geo-Information 5 (9), 148, 2016
Seed selection for information cascade in multilayer networks
F Erlandsson, P Bródka, A Borg
International Conference on Complex Networks and their Applications, 426-436, 2017
E-mail classification with machine learning and word embeddings for improved customer support
A Borg, M Boldt, O Rosander, J Ahlstrand
Neural Computing and Applications 33 (6), 1881-1902, 2021
Predicting User Participation in Social Media
F Erlandsson, A Borg, H Johnson, P Bródka
International Conference and School on Network Science, 126-135, 2016
Clustering Residential Burglaries Using Modus Operandi and Spatiotemporal Information
A Borg, M Boldt
International Journal of Information Technology & Decision Making 15 (01), 23-42, 2016
Comparison of Clustering Approaches for Gene Expression Data.
A Borg, N Lavesson, V Boeva
SCAI, 55-64, 2013
Anomaly detection of event sequences using multiple temporal resolutions and Markov chains
M Boldt, A Borg, S Ickin, J Gustafsson
Knowledge and Information Systems 62 (2), 669-686, 2020
Predicting burglars’ risk exposure and level of pre-crime preparation using crime scene data
M Boldt, A Borg, M Svensson, J Hildeby
Intelligent Data Analysis 22 (1), 167-190, 2018
E-mail Classification using Social Network Information
A Borg, N Lavesson
Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012
On the simulation of a software reputation system
M Boldt, A Borg, B Carlsson
2010 International Conference on Availability, Reliability and Security, 333-340, 2010
Alarm prediction in cellular base stations using data-driven methods
M Boldt, S Ickin, A Borg, V Kulyk, J Gustafsson
IEEE Transactions on Network and Service Management 18 (2), 1925-1933, 2021
Predicting e-mail response time in corporate customer support
A Borg, J Ahlstrand, M Boldt
22nd International Conference on Enterprise Information Systems, ICEIS 2020 …, 2020
A Statistical Method for Detecting Significant Temporal Hotspots using LISA Statistics
M Boldt, A Borg
2017 European Intelligence and Security Informatics Conference (EISIC), 123-126, 2017
Informed software installation through license agreement categorization
A Borg, M Boldt, N Lavesson
2011 Information Security for South Africa, 1-8, 2011
Detecting Crime Series Based on Route Estimation and Behavioral Similarity
A Borg, M Boldt, J Eliasson
2017 European Intelligence and Security Informatics Conference (EISIC), 1-8, 2017
Simulating malicious users in a software reputation system
A Borg, M Boldt, B Carlsson
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20