Author of the publication

Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests.

, , , , and . MILCOM, page 1880-1887. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Autonomous Resiliency Toolkit for Cyber Defense Platforms., , , , , , , and . ICAART (2), page 240-248. SCITEPRESS, (2020)Sketch: pen and touch recognition., and . IUI Companion, page 51-52. ACM, (2014)Remote Management of Boundary Protection Devices with Information Restrictions., , , and . AAAI, page 9398-9403. AAAI Press, (2019)Use of machine learning in big data analytics for insider threat detection., , , and . MILCOM, page 915-922. IEEE, (2015)Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests., , , , and . MILCOM, page 1880-1887. IEEE, (2013)Speech and sketching for multimodal design., and . IUI, page 214-216. ACM, (2004)Automated selection of synthetic biology parts for genetic regulatory networks., , , , and . ACS synthetic biology, 1 (8): 332--344 (Aug 17, 2012)IUI 2011 workshop: sketch recognition., and . IUI, page 465-466. ACM, (2011)Reports of the 2018 AAAI Fall Symposium., , , , , , , , , and 7 other author(s). AI Mag., 40 (2): 66-72 (2019)SkCHI: designing sketch recognition interfaces., , and . CHI Extended Abstracts, page 4501-4504. ACM, (2010)