A risk analysis of a smart home automation system A Jacobsson, M Boldt, B Carlsson Future Generation Computer Systems 56, 719-733, 2016 | 293 | 2016 |
Computer forensic timeline visualization tool J Olsson, M Boldt Digital Investigation 6, S78-S87, 2009 | 114 | 2009 |
Using VADER sentiment and SVM for predicting customer response sentiment A Borg, M Boldt Expert Systems with Applications 162, 113746, 2020 | 56 | 2020 |
Learning to detect spyware using end user license agreements N Lavesson, M Boldt, P Davidsson, A Jacobsson Knowledge and Information Systems 26 (2), 285-307, 2011 | 49 | 2011 |
Detecting serial residential burglaries using clustering A Borg, M Boldt, N Lavesson, U Melander, V Boeva Expert Systems with Applications 41 (11), 5252-5266, 2014 | 48 | 2014 |
A novel security-enhanced agile software development process applied in an industrial setting D Baca, M Boldt, B Carlsson, A Jacobsson 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 46 | 2015 |
Crawling online social networks F Erlandsson, R Nia, M Boldt, H Johnson, SF Wu 2015 Second European Network Intelligence Conference, 9-16, 2015 | 36 | 2015 |
Privacy threats related to user profiling in online social networks F Erlandsson, M Boldt, H Johnson 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 36 | 2012 |
On the Risk Exposure of Smart Home Automation Systems A Jacobsson, M Boldt, B Carlsson International Conference on Future Internet of Things and Cloud (FiCloud), 2014 | 30 | 2014 |
Exploring spyware effects M Boldt, A Jacobsson, B Carlsson The 9th Nordic Workshop on Secure IT-systems (NordSec), 2004 | 28 | 2004 |
Privacy-invasive software and preventive mechanisms M Boldt, B Carlsson International Conference on Systems and Networks Communications (ICSNC), 21-21, 2006 | 27 | 2006 |
Evaluating temporal analysis methods using residential burglary data M Boldt, A Borg ISPRS International Journal of Geo-Information 5 (9), 148, 2016 | 22 | 2016 |
Clustering Residential Burglaries Using Modus Operandi and Spatiotemporal Information A Borg, M Boldt International Journal of Information Technology & Decision Making, 2015 | 17 | 2015 |
Privacy-Invasive Software in Filesharing Tools A Jacobsson, M Boldt, B Carlsson Information Security Management, Education and Privacy, 281-296, 2004 | 15 | 2004 |
Automated spyware detection using end user license agreements M Boldt, A Jacobsson, N Lavesson, P Davidsson 2008 International Conference on Information Security and Assurance (isa …, 2008 | 14 | 2008 |
Evaluation of road user charging systems: the Swedish case JA Persson, P Davidsson, M Boldt, B Carlsson, M Fiedler Published papers within the ARENA project, 50, 2008 | 11 | 2008 |
Privacy-Invasive Software: Exploring Effects and Countermeasures M Boldt School of Computing, Blekinge Institute of Technology, 2007 | 11 | 2007 |
Analysing privacy-invasive software using computer forensic methods M Boldt, B Carlsson Proceedings of the International Conference on Systems and Networks …, 2006 | 11 | 2006 |
E-mail classification with machine learning and word embeddings for improved customer support A Borg, M Boldt, O Rosander, J Ahlstrand Neural Computing and Applications 33 (6), 1881-1902, 2021 | 10 | 2021 |
Spyware prevention by classifying end user license agreements N Lavesson, P Davidsson, M Boldt, A Jacobsson New Challenges in Applied Intelligence Technologies, 373-382, 2008 | 10 | 2008 |