Author of the publication

Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams.

, , , , and . IEEE Syst. J., 11 (2): 471-482 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graphic interfaces for knowledge-based system development., , and . CHI, page 9-15. ACM, (1986)FIPA: Foundation for Intelligent Physical Agents - Das aktuelle Schlagwort.. Künstliche Intell., 12 (3): 38 (1998)DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts., , , , , and . IEEE Syst. J., 11 (2): 483-493 (2017)Cooperation Structures in Multi-Agent Systems., and . Wissensbasierte Systeme, volume 291 of Informatik-Fachberichte, page 160-171. Springer, (1991)Towards a Distributed Multi-Person Lexical Environment., and . GLDV-Jahrestagung, page 255-264. Georg Olms Verlag, (1990)Multi-Agent Cooperation - Concepts and Applications., and . DISCO, volume 1128 of Lecture Notes in Computer Science, page 195-197. Springer, (1996)Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams., , , , and . IEEE Syst. J., 11 (2): 471-482 (2017)Privacy-Preserving Data Dissemination in Untrusted Cloud., , , , , , , , and . CLOUD, page 770-773. IEEE Computer Society, (2017)AIMS: Agent-based Information Management System., , , and . AAAI Fall Symposium: Semantic Web for Collaborative Knowledge Acquisition, volume FS-06-06 of AAAI Technical Report, page 40-47. AAAI Press, (2006)The Conceptual Framework of MAI2L., , , and . MAAMAW, volume 957 of Lecture Notes in Computer Science, page 217-230. Springer, (1993)