William Eberle
William Eberle
Verifierad e-postadress på tntech.edu
Citeras av
Citeras av
Genetic algorithms in feature and instance selection
CF Tsai, W Eberle, CY Chu
Knowledge-Based Systems 39, 240-247, 2013
Discovering structural anomalies in graph-based data
W Eberle, L Holder
Seventh IEEE international conference on data mining workshops (ICDMW 2007 …, 2007
Insider threat detection using a graph-based approach
W Eberle, J Graves, L Holder
Journal of Applied Security Research 6 (1), 32-81, 2010
Anomaly detection in data represented as graphs
W Eberle, L Holder
Intelligent Data Analysis 11 (6), 663-689, 2007
Smart grid energy fraud detection using artificial neural networks
V Ford, A Siraj, W Eberle
2014 IEEE Symposium on Computational Intelligence Applications in Smart Grid …, 2014
Graph-based approaches to insider threat detection
W Eberle, L Holder
Proceedings of the 5th annual workshop on cyber security and information …, 2009
A novel classifier ensemble approach for financial distress prediction
D Liang, CF Tsai, AJ Dai, W Eberle
Knowledge and Information Systems 54 (2), 437-462, 2018
Applying graph-based anomaly detection approaches to the discovery of insider threats
W Eberle, L Holder
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
Learning to detect representative data for large scale instance selection
WC Lin, CF Tsai, SW Ke, CW Hung, W Eberle
Journal of Systems and Software 106, 1-8, 2015
Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006.
S Mehrotra, DD Zeng, H Chen
Springer, 2006
Data preprocessing issues for incomplete medical datasets
MW Huang, WC Lin, CW Chen, SW Ke, CF Tsai, W Eberle
Expert Systems 33 (5), 432-438, 2016
Mining for insider threats in business transactions and processes
W Eberle, L Holder
2009 IEEE Symposium on Computational Intelligence and Data Mining, 163-170, 2009
Identifying threats using graph-based anomaly detection
W Eberle, L Holder, D Cook
Machine Learning in Cyber Trust, 73-108, 2009
Instance selection by genetic-based biological algorithm
ZY Chen, CF Tsai, W Eberle, WC Lin, SW Ke
Soft Computing 19 (5), 1269-1282, 2015
Survey of Crime Analysis and Prediction.
L Mookiah, W Eberle, A Siraj
FLAIRS Conference, 440-443, 2015
Detecting anomalies in cargo using graph properties
W Eberle, L Holder
International Conference on Intelligence and Security Informatics, 728-730, 2006
Detecting employee leaks using badge and network IP traffic
W Eberle, L Holder, J Graves
IEEE Symposium on Visual Analytics Science and Technology, 2009
Graph-based approaches to insider threat detection; CSIIRW'09 Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and …
W Eberle
Mining illegal insider trading of stocks: A proactive approach
SR Islam, SK Ghafoor, W Eberle
2018 IEEE International Conference on Big Data (Big Data), 1397-1406, 2018
Credit default mining using combined machine learning and heuristic approach
SR Islam, W Eberle, SK Ghafoor
arXiv preprint arXiv:1807.01176, 2018
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20