Author of the publication

Cyber Threat Hunting: A Cognitive Endpoint Behavior Analytic System.

, , , , , , , and . Int. J. Cogn. Informatics Nat. Intell., 15 (4): 1-23 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiency of Algorithmic Policing Tools: a nod to C.N. Parkinson., and . Canadian AI, Canadian Artificial Intelligence Association, (2022)Cyber Threat Hunting: A Cognitive Endpoint Behavior Analytic System., , , , , , , and . Int. J. Cogn. Informatics Nat. Intell., 15 (4): 1-23 (2021)A tale of two cities: Analyzing road accidents with big spatial data., and . IEEE BigData, page 3461-3470. IEEE Computer Society, (2017)Discovering EV Recharging Patterns through an Automated Analytical Workflow., , and . ISC2, page 1-8. IEEE, (2020)Competitive Analysis with Graph Embedding on Patent Networks., , and . CBI (1), page 10-19. IEEE, (2020)Fostering new Vertical and Horizontal IoT Applications with Intelligence Everywhere., , , and . CoRR, (2023)An Online, Adaptive and Unsupervised Regression Framework with Drift Detection for Label Scarcity Contexts., and . CoRR, (2023)Prior knowledge guided eQTL mapping for identifying candidate genes., , and . BMC Bioinform., (2016)An Automated Clustering Process for Helping Practitioners to Identify Similar EV Charging Patterns across Multiple Temporal Granularities., , and . SMARTGREENS, page 67-77. SCITEPRESS, (2021)An LSTM Encoder-Decoder Approach for Unsupervised Online Anomaly Detection in Machine Learning Packages for Streaming Data., , and . IEEE Big Data, page 3348-3357. IEEE, (2022)