Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MalSpot: Multi2 Malicious Network Behavior Patterns Analysis., , , , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 1-14. Springer, (2014)Inferring Strange Behavior from Connectivity Pattern in Social Networks., , , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 126-138. Springer, (2014)Data Mining Using Fractals and Power Laws.. SETN, volume 3955 of Lecture Notes in Computer Science, page 2. Springer, (2006)Cross-Outlier Detection., and . SSTD, volume 2750 of Lecture Notes in Computer Science, page 199-213. Springer, (2003)Spotting misbehaviors in location-based social networks using tensors., , and . WWW (Companion Volume), page 551-552. ACM, (2014)Future directions in data mining: streams, networks, self-similarity and power laws.. CIKM, page 93. ACM, (2002)F4: large-scale automated forecasting using fractals., and . CIKM, page 2-9. ACM, (2002)Selectivity Estimation of Window Queries., and . CIKM, page 340-347. ACM, (1998)Graph mining and influence propagation.. WICOW, page 1-2. ACM, (2008)Electricity Based External Similarity of Categorical Attributes., and . PAKDD, volume 2637 of Lecture Notes in Computer Science, page 486-500. Springer, (2003)