Author of the publication

Applying User Signatures on Fraud Detection in Telecommunications Networks.

, , and . ICDM, volume 6870 of Lecture Notes in Computer Science, page 286-299. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Crime Hotspot Detection Framework for Patrol Planning., , , , and . HPCC/SmartCity/DSS, page 1256-1263. IEEE, (2018)Historic Queries in Geosensor Networks., , , and . W2GIS, volume 4857 of Lecture Notes in Computer Science, page 148-161. Springer, (2007)An Agent-Based Collaborative Model For Supply Chain Management Simulation., , and . ECMS, page 318-324. European Council for Modeling and Simulation, (2012)Applying User Signatures on Fraud Detection in Telecommunications Networks., , and . ICDM, volume 6870 of Lecture Notes in Computer Science, page 286-299. Springer, (2011)Engagement Mechanisms for Social Machines., , and . GALA, volume 9599 of Lecture Notes in Computer Science, page 361-367. Springer, (2015)Embedded Systems Integration Using Web Services., , , and . ICN/ICONS/MCL, page 18. IEEE Computer Society, (2006)Assessment of fun in interactive systems: A survey., and . Cognitive Systems Research, (2017)An application of the ELECTRE TRI-C method to characterize government performance in OECD countries., , , and . ITOR, 26 (5): 1935-1955 (2019)Restoration Based on Bandwidth Degradation and Service Restoration Delay for Optical Cloud Networks., , , , , and . GLOBECOM, page 1-6. IEEE, (2017)Least-loaded-based routing with physical constraints in transparent optical networks., , , , and . LATINCOM, page 1-6. IEEE, (2017)