Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Representations for Log Data in Cybersecurity., , , , , and . CSCML, volume 10332 of Lecture Notes in Computer Science, page 250-268. Springer, (2017)FlexGP - Cloud-Based Ensemble Learning with Genetic Programming for Large Regression Problems., , , and . J. Grid Comput., 13 (3): 391-407 (2015)Bring Your Own Learner: A Cloud-Based, Data-Parallel Commons for Machine Learning., , , and . IEEE Comput. Intell. Mag., 10 (1): 20-32 (2015)eX2: a framework for interactive anomaly detection., , and . IUI Workshops, volume 2327 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)The Holy Grail of "Systems for Machine Learning": Teaming humans and machine learning for detecting cyber threats., and . SIGKDD Explor., 21 (2): 39-47 (2019)Building Predictive Models via Feature Synthesis., , and . GECCO, page 983-990. ACM, (2015)Multiple regression genetic programming., , and . GECCO, page 879-886. ACM, (2014)AI^2: Training a Big Data Machine to Defend., , , , and . BigDataSecurity/HPSC/IDS, page 49-54. IEEE, (2016)The Need for Interpretable Features: Motivation and Taxonomy., , , , and . SIGKDD Explor., 24 (1): 1-13 (2022)Shooting the moving target: machine learning in cybersecurity., and . OpML, page 13-14. USENIX Association, (2019)