Author of the publication

Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract).

, , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 412-414. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code., and . WOOT, page 91-102. USENIX Association, (2011)A Patch for Postel's Robustness Principle., , and . IEEE Secur. Priv., 10 (2): 87-91 (2012)Implementing a vertically hardened DNP3 control stack for power applications., , , , , , and . ICSS, page 45-53. ACM, (2016)The Bugs We Have to Kill., , and . login Usenix Mag., (2015)Using domain knowledge for ontology-guided entity extraction from noisy, unstructured text data., , , and . AND, page 101-106. ACM, (2009)From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring System., , , , , and . IEEE Trans. Mob. Comput., 13 (1): 216-229 (2014)Teaching the principles of the hacker curriculum to undergraduates., , and . SIGCSE, page 122-126. ACM, (2010)Backhoe, a Packet Trace and Log Browser., , , and . VizSEC, volume 5210 of Lecture Notes in Computer Science, page 152-160. Springer, (2008)Semi-supervised Data Organization for Interactive Anomaly Analysis., , and . ICMLA, page 55-62. IEEE Computer Society, (2006)Domain-specific entity extraction from noisy, unstructured data using ontology-guided search., , , , and . Int. J. Document Anal. Recognit., 14 (2): 201-211 (2011)