Author of the publication

Data Security Analysis Using Unsupervised Learning and Explanations.

, , , and . Innovations in Hybrid Intelligent Systems, volume 44 of Advances in Soft Computing, Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Two Lazy Learning Methods for Classification and Knowledge Discovery - A Case Study for Malignant Melanoma Diagnosis., and . KDIR, page 200-207. SciTePress, (2011)Logical methods in artificial intelligence applications., , and . J. Appl. Log., (2017)Special Issue on Pattern Recognition Techniques in Data Mining., , and . Pattern Recognit. Lett., (2017)Refining Discretizations of Continuous-Valued Attributes., and . MDAI, volume 7647 of Lecture Notes in Computer Science, page 258-269. Springer, (2012)A Lazy Learning Approach for Self-training.. MDAI, volume 8234 of Lecture Notes in Computer Science, page 117-125. Springer, (2013)Learning from cooperation using justifications., and . CCIA, volume 146 of Frontiers in Artificial Intelligence and Applications, page 47-54. IOS Press, (2006)Partial Domain Theories for Privacy., and . MDAI, volume 9880 of Lecture Notes in Computer Science, page 217-226. Springer, (2016)Symbolic Explanation of Similarities in Case-based Reasoning., and . Comput. Artif. Intell., 25 (2-3): 153-171 (2006)Building Partial Domain Theories from Explanations.. Künstliche Intell., 22 (2): 19-24 (2008)On Triangular Norm Based Fuzzy Description Logics., , and . IFSA/EUSFLAT Conf., page 891-896. (2009)