Martin Boldt
Martin Boldt
Associate professor, Computer science, Blekinge Institute of Technology
Verified email at - Homepage
Cited by
Cited by
A risk analysis of a smart home automation system
A Jacobsson, M Boldt, B Carlsson
Future Generation Computer Systems 56, 719-733, 2016
Using VADER sentiment and SVM for predicting customer response sentiment
A Borg, M Boldt
Expert Systems with Applications 162, 113746, 2020
Computer forensic timeline visualization tool
J Olsson, M Boldt
digital investigation 6, S78-S87, 2009
A novel security-enhanced agile software development process applied in an industrial setting
D Baca, M Boldt, B Carlsson, A Jacobsson
2015 10th international conference on availability, reliability and security …, 2015
Detecting serial residential burglaries using clustering
A Borg, M Boldt, N Lavesson, U Melander, V Boeva
Expert Systems with Applications 41 (11), 5252-5266, 2014
Learning to detect spyware using end user license agreements
N Lavesson, M Boldt, P Davidsson, A Jacobsson
Knowledge and Information Systems 26, 285-307, 2011
Crawling online social networks
F Erlandsson, R Nia, M Boldt, H Johnson, SF Wu
2015 Second European Network Intelligence Conference, 9-16, 2015
Privacy threats related to user profiling in online social networks
F Erlandsson, M Boldt, H Johnson
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
On the risk exposure of smart home automation systems
A Jacobsson, M Boldt, B Carlsson
2014 International Conference on Future Internet of Things and Cloud, 183-190, 2014
Exploring spyware effects
M Boldt, B Carlsson, A Jacobsson
Nordsec 2004, 2004
Evaluating temporal analysis methods using residential burglary data
M Boldt, A Borg
ISPRS International Journal of Geo-Information 5 (9), 148, 2016
Privacy-invasive software and preventive mechanisms
M Boldt, B Carlsson
2006 International Conference on Systems and Networks Communications (ICSNC …, 2006
E-mail classification with machine learning and word embeddings for improved customer support
A Borg, M Boldt, O Rosander, J Ahlstrand
Neural Computing and Applications 33 (6), 1881-1902, 2021
Clustering residential burglaries using modus operandi and spatiotemporal information
A Borg, M Boldt
International Journal of Information Technology & Decision Making 15 (01), 23-42, 2016
Anomaly detection of event sequences using multiple temporal resolutions and Markov chains
M Boldt, A Borg, S Ickin, J Gustafsson
Knowledge and Information Systems 62 (2), 669-686, 2020
Privacy-Invasive Software in Filesharing Tools
A Jacobsson, M Boldt, B Carlsson
Information Security Management, Education and Privacy: IFIP 18th World …, 2004
Automated spyware detection using end user license agreements
M Boldt, A Jacobsson, N Lavesson, P Davidsson
2008 International Conference on Information Security and Assurance (isa …, 2008
Analysing privacy-invasive software using computer forensic methods
M Boldt, B Carlsson
ICSEA, Papeetee, 2006
Predicting burglars’ risk exposure and level of pre-crime preparation using crime scene data
M Boldt, A Borg, M Svensson, J Hildeby
Intelligent Data Analysis 22 (1), 167-190, 2018
Software Vulnerability Assessment Version Extraction and Verification
M Boldt, B Carlsson, R Martinsson
International Conference on Software Engineering Advances (ICSEA 2007), 59-59, 2007
The system can't perform the operation now. Try again later.
Articles 1–20