Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Level Anomaly Detection on Streaming Graph Data., , , , and . CoRR, (2014)Nonparametric Bayesian Modeling for Automated Database Schema Matching., and . ICMLA, page 82-88. IEEE, (2015)Finite energy and bounded actuator attacks on cyber-physical systems., , , , , and . ECC, page 3659-3664. IEEE, (2015)A dynamic erasure code for multicasting live data.. CSIIRW, page 65. ACM, (2009)Addressing the challenges of anomaly detection for cyber physical energy grid systems., , , and . CSIIRW, page 3. ACM, (2013)Finite energy and bounded attacks on control system sensor signals., , , , and . ACC, page 1716-1722. IEEE, (2014)A New, Principled Approach to Anomaly Detection., , and . ICMLA (2), page 210-215. IEEE, (2012)978-1-4673-4651-1.Randomized Sampling for Large Data Applications of SVM., and . ICMLA (1), page 350-355. IEEE, (2012)A multi-level anomaly detection algorithm for time-varying graph data with interactive visualization., , , , and . Soc. Netw. Anal. Min., 6 (1): 99:1-99:14 (2016)Developing an Ontology for Cyber Security Knowledge Graphs., , , , , , , and . CISR, page 12:1-12:4. ACM, (2015)