Author of the publication

Processing of massive audit data streams for real-time anomaly intrusion detection.

, , and . Comput. Commun., 31 (1): 58-72 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting a Variety of Long-Term Stealthy User Behaviors on High Speed Links., , , and . IEEE Trans. Knowl. Data Eng., 31 (10): 1912-1925 (2019)A bi-level optimization for an HVAC system., , and . Clust. Comput., 20 (4): 3237-3249 (2017)Continuously Distinct Sampling over Centralized and Distributed High Speed Data Streams., , , , and . IEEE Trans. Parallel Distributed Syst., 30 (2): 300-314 (2019)Taming the Flow Table Overflow in OpenFlow Switch., , , and . SIGCOMM, page 591-592. ACM, (2016)Differential Inclusions-Based Neural Networks for Nonsmooth Convex Optimization on a Closed Convex Subset., , and . ISNN (1), volume 3971 of Lecture Notes in Computer Science, page 350-358. Springer, (2006)Fast intrusion detection based on a non-negative matrix factorization model., , and . J. Netw. Comput. Appl., 32 (1): 31-44 (2009)Learning Graph Embedding with Limited Labeled Data: An Efficient Sampling Approach., , , , , and . CoRR, (2020)On User Interaction Behavior as Evidence for Computer Forensic Analysis., , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 221-231. Springer, (2013)Efficiently Estimating Subgraph Statistics of Large Networks in the Dark., , , , , and . CoRR, (2013)Robust Scheduling of EV Charging Load With Uncertain Wind Power Integration., , and . IEEE Trans. Smart Grid, 9 (2): 1043-1054 (2018)