Author of the publication

A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization.

. Columbia University, USA, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems., , , , and . Mach. Learn., 81 (2): 179-205 (2010)Spectral Clustering and Embedding with Hidden Markov Models., , and . ECML, volume 4701 of Lecture Notes in Computer Science, page 164-175. Springer, (2007)System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models., , , and . IEEE Symposium on Security and Privacy Workshops, page 52-59. IEEE Computer Society, (2013)You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage., , , and . MobiCASE, page 51-61. ACM / ICST, (2016)A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization.. Columbia University, USA, (2012)Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic., , and . NDSS, The Internet Society, (2009)Brave New World: Pervasive Insecurity of Embedded Network Devices., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 378-380. Springer, (2009)Feature Points Recognition of Computerized Numerical Control Machining Tool Path Based on Deep Learning., , , , and . Comput. Aided Des., (2022)Density Estimation under Independent Similarly Distributed Sampling Assumptions., , and . NIPS, page 713-720. Curran Associates, Inc., (2007)On the infeasibility of modeling polymorphic shellcode., , , , and . ACM Conference on Computer and Communications Security, page 541-551. ACM, (2007)