Author of the publication

Learning Representations for Log Data in Cybersecurity.

, , , , , and . CSCML, volume 10332 of Lecture Notes in Computer Science, page 250-268. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fusion, Decision-Level., and . Encyclopedia of Biometrics, Springer US, (2015)Solving the "false positives" problem in fraud prediction., , , , and . CoRR, (2017)Prediction Factory: automated development and collaborative evaluation of predictive models., , , , and . CoRR, (2018)Cloud Scale Distributed Evolutionary Strategies for High Dimensional Problems., , and . EvoApplications, volume 7835 of Lecture Notes in Computer Science, page 519-528. Springer, (2013)Knowledge mining sensory evaluation data: genetic programming, statistical techniques, and swarm optimization., , and . Genet. Program. Evolvable Mach., 13 (1): 103-133 (2012)Probabilistically Driven Particle Swarms for Optimization of Multi Valued Discrete Problems : Design and Analysis., , and . SIS, page 141-149. IEEE, (2007)Label, Segment, Featurize: A Cross Domain Framework for Prediction Engineering., , and . DSAA, page 430-439. IEEE, (2016)Modeling Service Execution on Data Centers for Energy Efficiency and Quality of Service Monitoring., , and . SMC, page 103-108. IEEE, (2013)Acting the Same Differently: A Cross-Course Comparison of User Behavior in MOOCs., , , , and . EDM, page 376-381. International Educational Data Mining Society (IEDMS), (2016)Enabling Collaborative Data Science Development with the Ballet Framework., , , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW2): 431:1-431:39 (2021)