0 | -- | 0 | Xingsi Xue, Xiaojing Wu, Junfeng Chen. Optimizing Ontology Alignment Through an Interactive Compact Genetic Algorithm |
0 | -- | 0 | Aristotle Onumo, Irfan-Ullah Awan, Andrea J. Cullen. Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures |
0 | -- | 0 | Mingfei Teng, Hengshu Zhu, Chuanren Liu, Hui Xiong 0001. Exploiting Network Fusion for Organizational Turnover Prediction |
0 | -- | 0 | Youcef Djenouri, Jerry Chun-Wei Lin, Kjetil Nørvåg, Heri Ramampiaro, Philip S. Yu. Exploring Decomposition for Solving Pattern Mining Problems |
0 | -- | 0 | Ranjan Pal, Ziyuan Huang, Sergey V. Lototsky, Xinlong Yin, Mingyan Liu, Jon Crowcroft, Nishanth Sastry, Swades De, Bodhibrata Nag. Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age? A Cautionary Economics Tale for (Re-)Insurers and Likes |
0 | -- | 0 | Asma Belhadi, Youcef Djenouri, Djamel Djenouri, Tomasz P. Michalak, Jerry Chun-Wei Lin. Machine Learning for Identifying Group Trajectory Outliers |
0 | -- | 0 | Almas Abdibayev, Dongkai Chen, Haipeng Chen 0001, Deepti Poluru, V. S. Subrahmanian. Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents |
0 | -- | 0 | Ka Chung Ng, Mike K. P. So, Kar Yan Tam. A Latent Space Modeling Approach to Interfirm Relationship Analysis |