Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Localised Anomalous Behaviour in a Computer Network., , and . IDA, volume 8819 of Lecture Notes in Computer Science, page 321-332. Springer, (2014)Link prediction in dynamic networks using random dot product graphs., , , and . CoRR, (2019)Dynamic Bayesian Clustering., , and . J. Bioinform. Comput. Biol., (2013)Modelling New Edge Formation in a Computer Network through Bayesian Variable Selection., and . JISIC, page 272-275. IEEE, (2014)Statistical Frameworks for Detecting Tunnelling in Cyber Defence Using Big Data., , , and . JISIC, page 248-251. IEEE, (2014)Disassortativity of computer networks., , and . ISI, page 243-247. IEEE, (2016)A Review of Anomaly Detection on Graphs., , and . NATO ASI Mining Massive Data Sets for Security, volume 19 of NATO Science for Peace and Security Series - D: Information and Communication Security, page 212-213. IOS Press, (2007)Unsupervised attack pattern detection in honeypot data using Bayesian topic modelling., , , , , and . CoRR, (2023)Model-based clustering and new edge modelling in large computer networks., and . ISI, page 91-96. IEEE, (2016)Dissecting the fission yeast regulatory network reveals phase-specific control elements of its cell cycle., , , , , and . BMC Syst. Biol., (2009)