Author of the publication

Seurat: A Pointillist Approach to Anomaly Detection.

, , , , and . RAID, volume 3224 of Lecture Notes in Computer Science, page 238-257. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Populated IP addresses: classification and applications., , and . CCS, page 329-340. ACM, (2012)Spamming botnets: signatures and characteristics., , , , , and . SIGCOMM, page 171-182. ACM, (2008)Host Fingerprinting and Tracking on the Web: Privacy and Security Implications., , , , and . NDSS, The Internet Society, (2012)Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique., , , and . IEEE Symposium on Security and Privacy, page 207-222. IEEE Computer Society, (2010)Locality in Search Engine Queries and Its Implications for Caching., and . INFOCOM, page 1238-1247. IEEE Computer Society, (2002)Less is More: Sparse Graph Mining with Compact Matrix Decomposition., , , and . Stat. Anal. Data Min., 1 (1): 6-22 (2008)Innocent by association: early recognition of legitimate users., , , , , , , , and . CCS, page 353-364. ACM, (2012)Virtual disk based centralized management for enterprise networks., , and . INM@SIGCOMM, page 23-28. ACM, (2006)A case for unsupervised-learning-based spam filtering., , , , and . SIGMETRICS, page 367-368. ACM, (2010)SocialWatch: detection of online service abuse via large-scale social graphs., , , , , , and . AsiaCCS, page 143-148. ACM, (2013)