Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection for Insider Threats Using Unsupervised Ensembles., and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1152-1164 (2021)Machine learning based Insider Threat Modelling and Detection., and . IM, page 1-6. IFIP, (2019)Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning., and . IEEE Symposium on Security and Privacy Workshops, page 270-275. IEEE Computer Society, (2018)Dynamic Insider Threat Detection Based on Adaptable Genetic Programming., , and . SSCI, page 2579-2586. IEEE, (2019)Benchmarking genetic programming in dynamic insider threat detection., , and . GECCO (Companion), page 385-386. ACM, (2019)Exploring Adversarial Properties of Insider Threat Detection., and . CNS, page 1-9. IEEE, (2020)Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning., , and . IEEE Trans. Netw. Serv. Manag., 17 (1): 30-44 (2020)Exploring anomalous behaviour detection and classification for insider threat identification., and . Int. J. Netw. Manag., (2021)Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat Detection., , and . CNSM, page 1-7. IEEE, (2019)Benchmarking evolutionary computation approaches to insider threat detection., , , and . GECCO, page 1286-1293. ACM, (2018)