Author of the publication

Behavior-based modeling and its application to Email analysis.

, , , , , and . ACM Trans. Internet Techn., 6 (2): 187-221 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segmentation and Automated Social Hierarchy Detection through Email Network Analysis., , , and . WebKDD/SNA-KDD, volume 5439 of Lecture Notes in Computer Science, page 40-58. Springer, (2007)A comparative evaluation of two algorithms for Windows Registry Anomaly Detection., , , , , , and . J. Comput. Secur., 13 (4): 659-693 (2005)Email archive analysis through graphical visualization., , and . VizSEC, page 128-132. ACM, (2004)A temporal based forensic analysis of electronic communication., , and . DG.O, volume 151 of ACM International Conference Proceeding Series, page 23-24. Digital Government Research Center, (2006)Designing Host and Network Sensors to Mitigate the Insider Threat., , , , and . IEEE Secur. Priv., 7 (6): 22-29 (2009)Active authentication using file system decoys and user behavior modeling: results of a large scale study., , , , and . Comput. Secur., (2019)Discovering Organizational Hierarchy through a Corporate Ranking Algorithm: The Enron Case., , , , and . Complex., (2022)Combining email models for false positive reduction., and . KDD, page 98-107. ACM, (2005)Anomaly Detection in Computer Security and an Application to File System Accesses., , , , and . ISMIS, volume 3488 of Lecture Notes in Computer Science, page 14-28. Springer, (2005)A Survey of Insider Attack Detection Research., , and . Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)