Author of the publication

Malevolent Activity Detection with Hypergraph-Based Models.

, , , , and . IEEE Trans. Knowl. Data Eng., 29 (5): 1115-1128 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cybersecurity compliance analysis as a service: Requirements specification and application scenarios., , , , and . Concurr. Comput. Pract. Exp., (2018)NP Optimization Problems in Datalog., and . ILPS, page 181-195. MIT Press, (1997)Enhanced User Search Activity by Big Data Tools., , , and . SEBD, page 206-213. Matematicamente.it, (2016)CalcuList: a Functional Language Extended with Imperative Features., and . CoRR, (2018)Estimating Range Queries using Aggregate Data with Integrity Constraints: a Probabilistic Approach, , and . CoRR, (2005)Hierarchical binary histograms for summarizing multi-dimensional data., , , and . SAC, page 598-603. ACM, (2005)Properties of Database Schemata with Functional Dependencies., , and . PODS, page 19-28. ACM, (1984)Number of Minimal Hypergraph Transversals and Complexity of IFM with Infrequency: High in Theory, but Often Not so Much in Practice!, and . AI*IA, volume 11946 of Lecture Notes in Computer Science, page 193-209. Springer, (2019)Mining Frequent Instances on Workflows., , , and . PAKDD, volume 2637 of Lecture Notes in Computer Science, page 209-221. Springer, (2003)Similarity-Based Clustering of Web Transactions., , and . SAC, page 1212-1216. ACM, (2003)