Anton Borg

Learn More
A majority of E-mail is suspected to be spam. Traditional spam detection fails to differentiate between user needs and evolving social relationships. Online Social Networks (OSNs) contain more and more social information, contributed by users. OSN information may be used to improve spam detection. This paper presents a method that can use several social(More)
Today, there are difficulties finding all malicious programs due to juridical restrictions and deficits concerning the anti-malicious programs. Also, a "grey-zone" of questionable programs exists, hard for different protection programs to handle and almost impossible for a single user to judge. A software reputation system consisting of expert, average and(More)
Background: Software developers are facing increased pressure to lower development time, release new software versions more frequent to customers and to adapt to a faster market. This new environment forces developers and companies to move from a plan based waterfall development process to a flexible agile process. By minimizing the pre development planning(More)
Autoimmune haemolytic anaemia is not a well-recognised complication of sarcoidosis. We describe the case of a 30-year-old female who presented with acute warm haemolytic anaemia and widespread lymphadenopathy. Sarcoidosis was diagnosed on lymph node biopsy and further investigation. The haemolytic anaemia responded only to a high dose of steroids. Evidence(More)
Law enforcement agencies, as well as researchers rely on temporal analysis methods in many crime analyses, e.g., spatio-temporal analyses. A number of temporal analysis methods are being used, but a structured comparison in different configurations is yet to be done. This study aims to fill this research gap by comparing the accuracy of five existing, and(More)
Influential users play an important role in online social networks since users tend to have an impact on one other. Therefore, the proposed work analyzes users and their behavior in order to identify influential users and predict user participation. Normally, the success of a social media site is dependent on the activity level of the participating users.(More)
Residential burglaries are increasing. By visualizing patterns as spatial hotspots, law-enforcement agents can get a better understanding of crime distributions and trends. Two aspects are investigated, first, measuring the accuracy and performance of the KDE algorithm using small data sets. Secondly, investigation of the amount of crime data needed to(More)