Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A coding approach to event correlation., , , , and . Integrated Network Management, volume 11 of IFIP Conference Proceedings, page 266-277. Chapman & Hall, (1995)Minimal Cost Complexity Pruning of Meta-Classifiers., and . AAAI/IAAI, page 979. AAAI Press / The MIT Press, (1999)The PARULEL Parallel Rule Language., , and . ICPP (2), page 36-45. CRC Press, (1991)Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors., , and . ACSAC, page 367-376. IEEE Computer Society, (2008)Data Mining Approaches for Intrusion Detection., and . USENIX Security Symposium, USENIX Association, (1998)Email mining toolkit supporting law enforcement forensic analyses., and . DG.O, volume 89 of ACM International Conference Proceeding Series, page 221-222. Digital Government Research Center, (2005)AdaCost: Misclassification Cost-Sensitive Boosting., , , and . ICML, page 97-105. Morgan Kaufmann, (1999)Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study., , , and . DG.O, Digital Government Research Center, (2003)CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management., , and . USENIX Security Symposium, page 1057-1074. USENIX Association, (2017)Behavior-based modeling and its application to Email analysis., , , , , and . ACM Trans. Internet Techn., 6 (2): 187-221 (2006)