| 1 | STORM: A MapReduce Framework for Symbolic Time Intervals Series Classification | 4.3 | 0 | Citations (PDF) |
| 2 | Multivariate temporal data analysis ‐ a review | 11.4 | 10 | Citations (PDF) |
| 3 | All-cause mortality prediction in T2D patients with iTirps | 7.3 | 1 | Citations (PDF) |
| 4 | Pkg2Vec: Hierarchical package embedding for code authorship attribution | 7.9 | 13 | Citations (PDF) |
| 5 | Temporal pattern-based malicious activity detection in SCADA systems | 6.8 | 14 | Citations (PDF) |
| 6 | Outcomes prediction in longitudinal data: Study designs evaluation, use case in ICU acquired sepsis | 4.8 | 14 | Citations (PDF) |
| 7 | THAAD: Efficient matching queries under temporal abstraction for anomaly detection | 1.1 | 2 | Citations (PDF) |
| 8 | Decompiled APK based malicious code classification | 7.9 | 18 | Citations (PDF) |
| 9 | All-Cause Mortality Prediction in T2D Patients | 0.0 | 3 | Citations (PDF) |
| 10 | Acute Hypertensive Episodes Prediction | 0.0 | 4 | Citations (PDF) |
| 11 | Falls Prediction in Care Homes Using Mobile App Data Collection | 0.0 | 5 | Citations (PDF) |
| 12 | Temporal biomedical data analytics | 4.8 | 6 | Citations (PDF) |
| 13 | Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods | 7.3 | 14 | Citations (PDF) |
| 14 | Consistent discovery of frequent interval-based temporal patterns in chronic patients’ data | 4.8 | 28 | Citations (PDF) |
| 15 | <i>JASIST</i> special issue on biomedical information retrieval | 4.2 | 3 | Citations (PDF) |
| 16 | Procedure prediction from symbolic Electronic Health Records via time intervals analytics | 4.8 | 26 | Citations (PDF) |
| 17 | Prognosis of Clinical Outcomes with Temporal Patterns and Experiences with One Class Feature Selection | 3.7 | 23 | Citations (PDF) |
| 18 | Systems biology approaches for identifying adverse drug reactions and elucidating their underlying biological mechanisms | 8.2 | 38 | Citations (PDF) |
| 19 | Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework | 1.3 | 30 | Citations (PDF) |
| 20 | Temporal data analytics | 4.8 | 0 | Citations (PDF) |
| 21 | Improving condition severity classification with an efficient active learning based framework | 4.8 | 20 | Citations (PDF) |
| 22 | ALDROID: efficient update of Android anti-virus software using designated active learning methods | 3.6 | 27 | Citations (PDF) |
| 23 | Outcomes Prediction via Time Intervals Related Patterns 2015, 25, 919-924 | | 19 | Citations (PDF) |
| 24 | An Active Learning Framework for Efficient Condition Severity Classification | 0.0 | 6 | Citations (PDF) |
| 25 | ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files 2014, , 91-98 | | 27 | Citations (PDF) |
| 26 | Novel active learning methods for enhanced PC malware detection in windows OS | 8.8 | 92 | Citations (PDF) |
| 27 | Classification-driven temporal discretization of multivariate time series | 4.2 | 84 | Citations (PDF) |
| 28 | Classification of multivariate time series via temporal abstraction and time intervals mining | 3.6 | 84 | Citations (PDF) |
| 29 | Fast time intervals mining using the transitivity of temporal relations | 3.6 | 82 | Citations (PDF) |
| 30 | Detecting unknown computer worm activity via support vector machines and active learning | 2.2 | 54 | Citations (PDF) |
| 31 | User identity verification via mouse dynamics | 7.3 | 114 | Citations (PDF) |
| 32 | Detecting unknown malicious code by applying classification techniques on OpCode patterns | 1.3 | 198 | Citations (PDF) |
| 33 | Clustering di-graphs for continuously verifying users according to their typing patterns 2010, , | | 21 | Citations (PDF) |
| 34 | Continuous Verification Using Keystroke Dynamics 2010, , 411-415 | | 40 | Citations (PDF) |
| 35 | Vaidurya: A multiple-ontology, concept-based, context-sensitive clinical-guideline search engine | 4.8 | 25 | Citations (PDF) |
| 36 | Using artificial neural networks to detect unknown computer worms | 5.0 | 15 | Citations (PDF) |
| 37 | Unknown malcode detection and the imbalance problem | 3.2 | 60 | Citations (PDF) |
| 38 | Malicious Code Detection Using Active Learning | 0.0 | 29 | Citations (PDF) |
| 39 | Detection of unknown computer worms based on behavioral classification of the host | 1.5 | 88 | Citations (PDF) |
| 40 | Optimization of Fire blight scouting with a decision support system based on infection risk | 8.7 | 6 | Citations (PDF) |
| 41 | Unknown malcode detection via text categorization and the imbalance problem 2008, , | | 74 | Citations (PDF) |
| 42 | Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining 2007, , | | 10 | Citations (PDF) |
| 43 | Malicious Code Detection and Acquisition Using Active Learning 2007, , | | 15 | Citations (PDF) |
| 44 | A Comparative Evaluation of Full-text, Concept-based, and Context-sensitive Search | 4.1 | 26 | Citations (PDF) |
| 45 | Multiple hierarchical classification of free-text clinical guidelines | 7.3 | 25 | Citations (PDF) |
| 46 | A framework for a distributed, hybrid, multiple-ontology clinical-guideline library, and automated guideline-support tools | 4.8 | 80 | Citations (PDF) |
| 47 | Improving the Detection of Unknown Computer Worms Activity Using Active Learning | 0.0 | 14 | Citations (PDF) |