Author of the publication

Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests.

, , , , and . MILCOM, page 1880-1887. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience., , , , , , and . ICDCS Workshops, page 104-. IEEE Computer Society, (2003)Usable Survivability., , , and . INC, page 209-212. University of Plymouth, (2010)An architecture for adaptive intrusion-tolerant applications., , , , , , , , , and 3 other author(s). Softw. Pract. Exp., 36 (11-12): 1331-1354 (2006)Assessing trustworthiness in collaborative environments., , , and . CSIIRW, page 52. ACM, (2013)Using Distributed Ledgers For Command and Control - Concepts and Challenges., , , and . MILCOM, page 55-60. IEEE, (2021)Avoiding common security flaws in composed service-oriented systems., , , and . DSN Workshops, page 1-6. IEEE Computer Society, (2012)The UMASS Intelligent Home Project., , , , , , , , and . Agents, page 291-298. ACM, (1999)Packaging Quality of Service Control Behaviors for Reuse., , , and . Symposium on Object-Oriented Real-Time Distributed Computing, page 375-385. IEEE Computer Society, (2002)Learning Quantitative Knowledge for Multiagent Coordination., , , and . AAAI/IAAI, page 24-31. AAAI Press / The MIT Press, (1999)Use of machine learning in big data analytics for insider threat detection., , , and . MILCOM, page 915-922. IEEE, (2015)