Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LPS Algorithms., , and . FGCS, page 436-448. OHMSHA Ltd. Tokyo and North-Holland, (1984)Behavior Profiling of Email., , , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 74-90. Springer, (2003)Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses., , , , and . RAID, volume 2516 of Lecture Notes in Computer Science, page 36-53. Springer, (2002)A Fully Distributed Framework for Cost-Sensitive Data Mining., , , and . ICDCS, page 445-446. IEEE Computer Society, (2002)Decoy Document Deployment for Effective Masquerade Attack Detection., and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 35-54. Springer, (2011)A coding approach to event correlation., , , , and . Integrated Network Management, volume 11 of IFIP Conference Proceedings, page 266-277. Chapman & Hall, (1995)Minimal Cost Complexity Pruning of Meta-Classifiers., and . AAAI/IAAI, page 979. AAAI Press / The MIT Press, (1999)The PARULEL Parallel Rule Language., , and . ICPP (2), page 36-45. CRC Press, (1991)Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors., , and . ACSAC, page 367-376. IEEE Computer Society, (2008)Email mining toolkit supporting law enforcement forensic analyses., and . DG.O, volume 89 of ACM International Conference Proceeding Series, page 221-222. Digital Government Research Center, (2005)