William Eberle
William Eberle
Verifierad e-postadress på tntech.edu
Titel
Citeras av
Citeras av
År
Genetic algorithms in feature and instance selection
CF Tsai, W Eberle, CY Chu
Knowledge-Based Systems 39, 240-247, 2013
2232013
Discovering structural anomalies in graph-based data
W Eberle, L Holder
Seventh IEEE international conference on data mining workshops (ICDMW 2007 …, 2007
1962007
Insider threat detection using a graph-based approach
W Eberle, J Graves, L Holder
Journal of Applied Security Research 6 (1), 32-81, 2010
1592010
Anomaly detection in data represented as graphs
W Eberle, L Holder
Intelligent Data Analysis 11 (6), 663-689, 2007
1392007
Smart grid energy fraud detection using artificial neural networks
V Ford, A Siraj, W Eberle
2014 IEEE Symposium on Computational Intelligence Applications in Smart Grid …, 2014
852014
Graph-based approaches to insider threat detection
W Eberle, L Holder
Proceedings of the 5th annual workshop on cyber security and information …, 2009
362009
A novel classifier ensemble approach for financial distress prediction
D Liang, CF Tsai, AJ Dai, W Eberle
Knowledge and Information Systems 54 (2), 437-462, 2018
312018
Applying graph-based anomaly detection approaches to the discovery of insider threats
W Eberle, L Holder
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
312009
Learning to detect representative data for large scale instance selection
WC Lin, CF Tsai, SW Ke, CW Hung, W Eberle
Journal of Systems and Software 106, 1-8, 2015
302015
Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006.
S Mehrotra, DD Zeng, H Chen
Springer, 2006
232006
Data preprocessing issues for incomplete medical datasets
MW Huang, WC Lin, CW Chen, SW Ke, CF Tsai, W Eberle
Expert Systems 33 (5), 432-438, 2016
192016
Mining for insider threats in business transactions and processes
W Eberle, L Holder
2009 IEEE Symposium on Computational Intelligence and Data Mining, 163-170, 2009
162009
Identifying threats using graph-based anomaly detection
W Eberle, L Holder, D Cook
Machine Learning in Cyber Trust, 73-108, 2009
162009
Instance selection by genetic-based biological algorithm
ZY Chen, CF Tsai, W Eberle, WC Lin, SW Ke
Soft Computing 19 (5), 1269-1282, 2015
132015
Survey of Crime Analysis and Prediction.
L Mookiah, W Eberle, A Siraj
FLAIRS Conference, 440-443, 2015
132015
Detecting anomalies in cargo using graph properties
W Eberle, L Holder
International Conference on Intelligence and Security Informatics, 728-730, 2006
122006
Detecting employee leaks using badge and network IP traffic
W Eberle, L Holder, J Graves
IEEE Symposium on Visual Analytics Science and Technology, 2009
112009
Graph-based approaches to insider threat detection; CSIIRW'09 Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and …
W Eberle
11
Mining illegal insider trading of stocks: A proactive approach
SR Islam, SK Ghafoor, W Eberle
2018 IEEE International Conference on Big Data (Big Data), 1397-1406, 2018
102018
Credit default mining using combined machine learning and heuristic approach
SR Islam, W Eberle, SK Ghafoor
arXiv preprint arXiv:1807.01176, 2018
102018
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20