Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Addressing the challenges of anomaly detection for cyber physical energy grid systems., , , and . CSIIRW, page 3. ACM, (2013)Finite energy and bounded attacks on control system sensor signals., , , , and . ACC, page 1716-1722. IEEE, (2014)Multi-Level Anomaly Detection on Time-Varying Graph Data., , , , and . ASONAM, page 579-583. ACM, (2015)Multi-Level Anomaly Detection on Streaming Graph Data., , , , and . CoRR, (2014)Situ: Identifying and Explaining Suspicious Behavior in Networks., , , , , , , and . IEEE Trans. Vis. Comput. Graph., 25 (1): 204-214 (2019)Finite energy and bounded actuator attacks on cyber-physical systems., , , , , and . ECC, page 3659-3664. IEEE, (2015)Nonparametric Bayesian Modeling for Automated Database Schema Matching., and . ICMLA, page 82-88. IEEE, (2015)Randomized Sampling for Large Data Applications of SVM., and . ICMLA (1), page 350-355. IEEE, (2012)A New, Principled Approach to Anomaly Detection., , and . ICMLA (2), page 210-215. IEEE, (2012)978-1-4673-4651-1.A multi-level anomaly detection algorithm for time-varying graph data with interactive visualization., , , , and . Soc. Netw. Anal. Min., 6 (1): 99:1-99:14 (2016)