Martin Boldt

Martin Boldt

Senior lecturer

martin.boldt@bth.se

Department of Computer Science and Engineering, Room J3120

+46 (0) 455-385837

Download:

CV

About Martin Boldt

I’m a PhD in computer science at Blekinge Institute of Technology in Sweden. As a member of the Department of Computer Science and Engineering my main research focus is in Information Security and Computational Criminology, which are approached using various methods from the interdisciplinary field of Data Science. Currently I’m working in two interesting research projects. The first project is funded by the Knowledge Foundation during 2014-2020 and is titled Scalable resource-efficient systems for big data analytics. In this project I’m invovled in studies regarding unsupervised methods for anomaly detection as well as e-mail content to experts mappings. The second project is together with the Swedish Police and the Swedish National Forensic Centre. This project focuses on the mitigation of serial volume crime, in particular residential burglaries, using data-driven methods. More information about the co-operation with the police is available here (in Swedish).

When it comes to commissions of trust-committments I’m general chair for IEEE EISIC’18 and a member of the program committe for various conferences. During 2017/18 I’m guest editor for a special issue on Computation Criminology: computer science methods for crime analysis in Springer’s journal on Security Informatics. I’m also in the editorial board for EAI Endorsed Transactions on Security and Safety. When it comes to committments at the local university I’m a teacher representative in the university board as well as examiner for Masters theses projects in computer science. Finally, I’m peer-reviewing manuscripts for various journals, conferences and workshops, e.g. ICML, NIPS, FSDM, ENIC and  EISIC.


Ongoing work

Anton Borg, Martin Boldt, Oliver Rosander and Jim Ahlstrand, “Decision support system for e-mail classification using machine learning and word embeddings for improved customer support”, journal manuscript, 2018.

Martin Boldt, Anton Borg, Selim Ickin, and Jörgen Gustafsson, “Base station failure prediction using novel data-driven telecom KPIs”, conference manuscript, 2018.

Martin Boldt and Njomza Stojkaj, “Evaluation of a suspect retrieval system using random choice probabilities in a Swedish setting”, journal manuscript, 2018.

Martin Boldt, Anton Borg, Göran Landvall and Johan Sundqvist, “Evaluating the efficiency and quality of structured crime reports compared to traditional text-based crime reports”, journal manuscript, 2018.

Martin Boldt, Veselka Boeva, Anton Borg, Jonas Hildeby and Teresa Maric, ”A multi-expert approach for estimating burglars’ risk exposure and level of pre-crime preparation using on crime scene data”, journal manuscript, 2018.

Submitted

Martin Boldt, Anton Borg, Selim Ickin, and Jörgen Gustafsson, “Anomaly detection of event sequences using multiple temporal resolutions and Markov chains”, journal manuscript submitted to Knowledge and Information Systems (KAIS), 2018.

Anton Borg, Martin Boldt and Johan Svensson, “Using conformal prediction for multi-label document classification in e-mail support systems”, submitted to the 34th conference on uncertainty in artificial intelligence (UAI), 2018.

Accepted (in press)

Martin Boldt and Kaavya Rekanar, “On the analysis and binary classification of privacy policies from both rogue and top 100 Fortune global companies”, to appear in International Journal of Information Security and Privacy, Special Issue on Machine Learning Techniques for Information Security and Data Privacy, 2018.

Martin Boldt, “An evaluation of the efficiency and quality of structured crime reports”, to appear in Nordic Journal of Policing Studies, 2018.


Published work

In journals/books (peer reviewed)

Martin Boldt, Anton Borg, Martin Svensson, Jonas Hildeby, “Predicting burglars’ risk exposure and level of pre-crime preparation using crime scene data”, in Journal of Intelligent Data Analysis,  volume 22, issue 1, ISI impact factor: 0.631, 2018. [PDF]

Martin Boldt, Andreas Jacobsson, Dejan Baca and Bengt Carlsson, “Introducing a novel security-enhanced agile software development process”,  in International Journal of Secure Software Engineering, volume 8, issue 2, 2017, DOI: 10.4018/IJSSE.2017040102.

Fredrik Erlandsson, Piotr Bródka, Martin Boldt and Henric Johnson, “Do we really need to catch them all? User-guided social media crawling method”, in Entropy, volume 19, issue 12, ISI impact factor: 1.821, 2017. [PDF]

Martin Boldt and Anton Borg, “Evaluating temporal analysis methods using residential burglary data”, in International Journal of Geo-Information – Special Issue “Frontiers in Spatial and Spatiotemporal Crime Analytics”, ISI impact factor: 1.502, 2016, DOI: 10.3390/ijgi5090148

Anton Borg and Martin Boldt, “Clustering residential burglaries using modus operandi and spatiotemporal information”, in International Journal of Information Technology & Decision Making, World Scientific, ISI impact factor: 1.406, 2016, DOI: http://www.worldscientific.com/doi/10.1142/S0219622015500339

Andreas Jacobsson, Martin Boldt and Bengt Carlsson, “A risk analysis of a smart home automation systems”, in Journal of Future Generation Computer Systems, Elsevier, ISI impact factor: 2.786, 2015, DOI: http://www.sciencedirect.com/science/article/pii/S0167739X15002812

Anton Borg, Martin Boldt, Niklas Lavesson, Ulf Melander, Vaselka Boeva, “Detecting serial residential burglaries using clustering”, in Journal of Expert Systems with Applications, Elsevier, Vol. 44, Issue 11, ISI impact factor: 2.339, 2014, DOI: 10.1016/j.eswa.2014.02.035

Niklas Lavesson, Martin Boldt, Paul Davidsson and Andreas Jacobsson, “Learning to detect spyware using end user license agreements”, in International Journal of Knowledge and Information Systems (KAIS), Springer, Vol. 26, Issue 2. ISI impact Factor: 2.225, 2009, DOI: 10.1007/s10115-009-0278-z

Jens Olsson and Martin Boldt, “Computer forensic timeline visualization tool”, in Journal of Digital Investigation, Elsevier, Vol. 6, ISI impact factor: 0.768, 2009, DOI: 10.1016/j.diin.2009.06.008

Martin Boldt and Bengt Carlsson, “Privacy-invasive software and preventive mechanisms”, in Ravi K. Jain (Ed.) Malware: An Introduction, ICFAI Press, 2007. (ISBN: 81-314-0527-3)

In conference/workshop proceedings (peer reviewed)

Martin Boldt, Anton Borg and Veselka Boeva, “Multi-expert estimations of burglars’ risk exposure and level of pre-crime preparation using on crime scene data”, to appear in proceedings of the 30th Annual Workshop of the Swedish Artificial Intelligence Society (SAIS), 2017. [PDF]

Martin Boldt and Anton Borg, “A statistical method for detecting significant temporal hotspots using LISA statistics”to appear in proceedings of the 8th European Intelligence and Security Informatics Conference (EISIC), 2017. [PDF]

Anton Borg, Martin Boldt and Johan Eliasson, “Detecting crime series based on route estimations and behavioral similarity”, to appear in proceedings of the 8th European Intelligence and Security Informatics Conference (EISIC), 2017. [PDF]

Martin Boldt and Jaswanth Bala, “Filtering estimated crime series based on route calculations on spatiotemporal data”, in proceedings of the 7th European Intelligence and Security Informatics Conference (EISIC), 2016. DOI: 10.1109/EISIC.2016.024

Dejan Baca, Martin Boldt, Bengt Carlsson and Andreas Jacobsson, “A novel security-enhanced agile software development process applied in an industrial setting”, in proceedings of the 10th International Conference on Availability, Reliability and Security (ARES), Lecture Notes in Computer Science, 2015.

Fredrik Erlandsson, Roozbeh Nia, Martin Boldt, Henric Johnson and Felix Wu, “Crawling online social networks”, in proceedings of the Second European Network Intelligence Conference (ENIC), 2015.

Raja Khurram Shahzad, Mehwish Fatima, Niklas Lavesson, Martin Boldt, “Consensus decision making in random forests”, in Machine Learning, Optimization, and Big Data, Lecture Notes in Computer Science 9432, 2015. DOI: 10.1007/978-3-319-27926-8_31

Martin Boldt and Anton Borg, “En strukturerad metod för registrering och automatisk analys av brott”, in proceedings of The 5th Biennial Nordic Police Research Seminar, 2014.

Martin Boldt, Andreas Jacobsson, Bengt Carlsson, “On the risk exposure of smart home automation systems”, in proceedings of the 2nd IEEE International Conference on Future Internet of Things and Cloud (FiCloud-2014), 2014.

Fredrik Erlandsson, Martin Boldt and Henric Johnson, “Privacy threats related to user profiling in online social networks”, in Proceedings of 4th IEEE International Conference on Information Privacy, Security, Risk and Trust, 2012.

Anton Borg, Martin Boldt and Bengt Carlsson, “Simulating malicious users in a software reputation system”, Communications in Computer and Information Science, Vol. 186, 2011.

Anton Borg, Martin Boldt and Niklas Lavesson, “Informed software installation through license agreement categorization”, in Proceedings of Information Security South Africa (ISSA), 2011.

Martin Boldt, Anton Borg and Bengt Carlsson, “On the simulation of a software reputation system”, in Proceedings of the International Conference on Availability, Reliability and Security (ARES), 2010.

Niklas Lavesson, Paul Davidsson, Martin Boldt and Andreas Jacobsson, “Spyware prevention by classifying end user license agreements”, in Studies in Computational Intelligence, Volume 134, Springer, 2008.

Martin Boldt, Paul Davidsson, Andreas Jacobsson and Niklas Lavesson, “Automated spyware detection using end user license agreements”, in the Proceedings of the Second International Conference on Information Security and Assurance, Busan Korea, 2008.

Martin Boldt and Bengt Carlsson, “Confidentiality aspects within road user charging systems: the Swedish case”, in Proceedings of the 15th ITS World Congress, New York, 2008.

Bengt Carlsson and Martin Boldt, “Security analysis of the Swedish road user charging system”, in Proceedings of the 15th ITS World Congress, New York, 2008.

Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén, “Preventing privacy-invasive software using online reputations”,  in Lecture Notes in Computer Science, Volume 4721, Springer Verlag, Berlin Germany, 2007.

Jan Persson, Paul Davidsson, Martin Boldt, Bengt Carlsson, Marcus Fiedler, “Evaluation of road user charging systems: the Swedish case”, in  Proceedings of the 14th World Congress on Intelligent Transport Systems, Beijing China, 2007.

Martin Boldt, Bengt Carlsson, Roy Martinsson, “Software vulnerability assessment – version extraction and verification”, in Proceedings of the International Conference on Systems and Networks Communications (ICSEA 2007), Cap Esterel France, 2007.

Martin Boldt and Bengt Carlsson, “Privacy-invasive software and preventive mechanisms”, in Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), Papeete French Polynesia, 2006.

Martin Boldt and Bengt Carlsson, “Analysing countermeasures against privacy-invasive software”, in Proceedings of the International Conference on Systems and Networks Communications (ICSEA 2006), Papeete French Polynesia, 2006.

Martin Boldt, Bengt Carlsson and Andreas Jacobsson, “Exploring spyware effects”, in Proceedings of the Nordic Workshop on Secure IT Systems (NordSec04), Helsinki Finland, 2004. [ PDF ]

Andreas Jacobsson, Martin Boldt and Bengt Carlsson, “Privacy-invasive software in file-sharing tools”, in Proceedings of the IFIP World Computer Congress (WCC2004), Toulouse France, 2004.

Johan Wieslander, Martin Boldt and Bengt Carlsson, “Investigating spyware on the internet”, in Proceedings of the Nordic Workshop on Secure IT Systems (NordSec03), Gjövik Norway, 2003.

Theses

Martin Boldt, Privacy-Invasive Software, Dissertations, 2010.

Martin Boldt, “Privacy-invasive software – exploring effects and countermeasures”, Licentiate Thesis Series, No. 2007:01, School of Engineering, Blekinge Institute of Technology, Sweden, 2007.

Other

Technical reports, white papers etc. are not listed here.

Quick facts

420