Customer churn prediction in telecommunications B Huang, MT Kechadi, B Buckley Expert Systems with Applications 39 (1), 1414-1425, 2012 | 450 | 2012 |
Cloud forensics K Ruan, J Carthy, T Kechadi, M Crosbie Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference …, 2011 | 447 | 2011 |
Implications of LHCb measurements and future prospects LHCb Collaboration TJ Gershon@ warwick. ac. uk, A Bharucha, II Bigi, ... The European Physical Journal C 73, 1-92, 2013 | 343 | 2013 |
Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results K Ruan, J Carthy, T Kechadi, I Baggili Digital Investigation 10 (1), 34-43, 2013 | 236 | 2013 |
Exploratory spatio-temporal data mining and visualization P Compieta, S Di Martino, M Bertolotto, F Ferrucci, T Kechadi Journal of Visual Languages & Computing 18 (3), 255-279, 2007 | 207 | 2007 |
Multi-objective feature selection by using NSGA-II for customer churn prediction in telecommunications B Huang, B Buckley, TM Kechadi Expert Systems with Applications 37 (5), 3638-3646, 2010 | 191 | 2010 |
Cupcarbon: A multi-agent and discrete event wireless sensor network design and simulation tool K Mehdi, M Lounis, A Bounceur, T Kechadi Seventh International Conference on Simulation Tools and Techniques, 2014 | 149 | 2014 |
An effective hybrid learning system for telecommunication churn prediction Y Huang, T Kechadi Expert Systems with Applications 40 (14), 5635-5647, 2013 | 140 | 2013 |
Human activity recognition with convolutional neural networks A Bevilacqua, K MacDonald, A Rangarej, V Widjaya, B Caulfield, ... Machine Learning and Knowledge Discovery in Databases: European Conference …, 2019 | 126 | 2019 |
Application of data mining for anti-money laundering detection: A case study NA Le Khac, MT Kechadi 2010 IEEE international conference on data mining workshops, 577-584, 2010 | 119 | 2010 |
Internet of things forensics–challenges and a case study S Alabdulsalam, K Schaefer, T Kechadi, NA Le-Khac Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International …, 2018 | 114 | 2018 |
Privacy-aware blockchain innovation for 6G: Challenges and opportunities T Nguyen, N Tran, L Loven, J Partala, MT Kechadi, S Pirttikangas 2020 2nd 6G Wireless Summit (6G SUMMIT), 1-5, 2020 | 98 | 2020 |
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis K Ruan, I Baggili, J Carthy, T Kechadi | 91 | 2011 |
A new feature set with new window techniques for customer churn prediction in land-line telecommunications BQ Huang, TM Kechadi, B Buckley, G Kiernan, E Keogh, T Rashid Expert Systems with Applications 37 (5), 3657-3665, 2010 | 91 | 2010 |
Dimensionality reduction in data mining: A Copula approach R Houari, A Bounceur, MT Kechadi, AK Tari, R Euler Expert Systems with Applications 64, 247-260, 2016 | 86 | 2016 |
Edge-Enabled Metaverse: The Convergence of Metaverse and Mobile Edge Computing N Aung, S Dhelim, L Chen, H Ning, L Atzori, T Kechadi Tsinghua Science and Technology 29 (3), 795-805, 2023 | 83* | 2023 |
A complete formalized knowledge representation model for advanced digital forensics timeline analysis Y Chabot, A Bertaux, C Nicolle, MT Kechadi Digital Investigation 11, S95-S105, 2014 | 82 | 2014 |
Framework TDR for the LHCb upgrade: technical design report I Bediaga, H Chanal, P Hopchev, S Cadeddu, S Stoica, M Calvo Gomez, ... LHCb-TDR-012, 2012 | 80 | 2012 |
Preprocessing techniques for online handwriting recognition BQ Huang, YB Zhang, MT Kechadi Seventh International Conference on Intelligent Systems Design and …, 2007 | 80 | 2007 |
An ontology-based approach for the reconstruction and analysis of digital incidents timelines Y Chabot, A Bertaux, C Nicolle, T Kechadi Digital Investigation 15, 83-100, 2015 | 65 | 2015 |