Author of the publication

Detecting Localised Anomalous Behaviour in a Computer Network.

, , and . IDA, volume 8819 of Lecture Notes in Computer Science, page 321-332. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eliminating Steganography in Internet Traffic with Active Wardens., , , and . Information Hiding, volume 2578 of Lecture Notes in Computer Science, page 18-35. Springer, (2002)Anomaly Detection in Large Scale Networks with Latent Space Models., , , and . CoRR, (2019)Peer-group Behaviour Analytics of Windows Authentications Events Using Hierarchical Bayesian Modelling., , , , and . CoRR, (2022)Attack chain detection., , and . Stat. Anal. Data Min., 8 (5-6): 353-363 (2015)A Large-Scale Database for Graph Representation Learning., , , and . CoRR, (2020)Anomaly Detection in Large-Scale Networks With Latent Space Models., , , , and . Technometrics, 64 (2): 241-252 (2022)Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback., , , , , , and . ICASSP, page 2872-2876. IEEE, (2019)A Large-Scale Database for Graph Representation Learning., , , and . NeurIPS Datasets and Benchmarks, (2021)Improving antivirus accuracy with hypervisor assisted analysis., , and . J. Comput. Virol., 7 (2): 121-131 (2011)Graph-based malware detection using dynamic analysis., , , , and . J. Comput. Virol., 7 (4): 247-258 (2011)