Author of the publication

Exploiting N-Gram Location for Intrusion Detection.

, , and . ICTAI, page 1093-1098. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Generalizing the Unification with Statistical Outliers: The Gradient Outlier Factor Measure., and . ACM Trans. Knowl. Discov. Data, 10 (3): 27:1-27:26 (2016)Reducing distance computations for distance-based outliers., , , and . Expert Syst. Appl., (2020)A grid-based architecture for nearest neighbor based condensation of huge datasets., and . UPGRADE-CN, page 13-20. ACM, (2008)Uncertain distance-based outlier detection with arbitrarily shaped data objects., and . J. Intell. Inf. Syst., 57 (1): 1-24 (2021)Outlier detection by logic programming., , and . ACM Trans. Comput. Log., 9 (1): 7 (2007)$LatentOut$: an unsupervised deep anomaly detection approach exploiting latent space distribution., , and . Mach. Learn., 112 (11): 4323-4349 (November 2023)Tractable Strong Outlier Identification, , and . CoRR, (2011)Collegamento di Basi di Dati Orientate agli Oggetti a Basi di Dati Relazionali Remote., , , and . SEBD, page 397-406. Editrice Esculapio Progetto Leonardo, via U. Terracini, 30, 40131 Bologna, (1994)Condensed Nearest Neighbor Data Domain Description.. IDA, volume 3646 of Lecture Notes in Computer Science, page 12-23. Springer, (2005)Approximate k-Closest-Pairs in Large High-Dimensional Data Sets., and . J. Math. Model. Algorithms, 4 (2): 149-179 (2005)