Author of the publication

WebHound: a data-driven intrusion detection from real-world web access logs.

, , , , and . Soft Comput., 23 (22): 11947-11965 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering signature of social networks with application to community detection., , and . COMSNETS, page 1-7. IEEE, (2014)Man-O-Meter: Modeling and Assessing the Evolution of Language Usage of Individuals on Microblogs., , , and . APWeb (1), volume 9931 of Lecture Notes in Computer Science, page 342-355. Springer, (2016)WebHound: a data-driven intrusion detection from real-world web access logs., , , , and . Soft Comput., 23 (22): 11947-11965 (2019)Driving the Last Mile: Characterizing and Understanding Distracted Driving Posts on Social Networks., , , , , and . ICWSM, page 393-404. AAAI Press, (2020)TellTail: Fast Scoring and Detection of Dense Subgraphs., , , and . AAAI, page 4150-4157. AAAI Press, (2020)A model-based approach to anomaly detection in software architectures., , , , , and . HotSoS, page 69-71. ACM, (2016)Dissecting users' needs for search result explanations., , , , , and . CoRR, (2024)An Empirical Comparison of Bias Reduction Methods on Real-World Problems in High-Stakes Policy Settings., , and . SIGKDD Explor., 23 (1): 69-85 (2021)Modeling Topical Information Diffusion over Microblog Networks., , , , and . COMPLEX NETWORKS (1), volume 812 of Studies in Computational Intelligence, page 353-364. Springer, (2018)Stop the KillFies! Using Deep Learning Models to Identify Dangerous Selfies., , , , , and . WWW (Companion Volume), page 1341-1345. ACM, (2018)