Author of the publication

High Fidelity Data Reduction for Big Data Security Dependency Analyses.

, , , , , , , , and . ACM Conference on Computer and Communications Security, page 504-516. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A dual-stage attention-based recurrent neural network for time series prediction, , , , , and . Proceedings of the 26th International Joint Conference on Artificial Intelligence, page 2627--2633. AAAI Press, (2017)From Categorical to Numerical: Multiple Transitive Distance Learning and Embedding., , , , , , and . SDM, page 46-54. SIAM, (2015)Predictive VM consolidation on multiple resources: Beyond load balancing., , , , and . IWQoS, page 83-92. IEEE, (2013)Optimal Probing for Unicast Network Delay Tomography., , , and . INFOCOM, page 1244-1252. IEEE, (2010)The theory of trackability with applications to sensor networks., , and . ACM Trans. Sens. Networks, 4 (3): 16:1-16:42 (2008)Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems., , and . IEEE Trans. Dependable Secur. Comput., 3 (4): 312-326 (2006)Modeling and analytics for cyber-physical systems in the age of big data., , , , and . SIGMETRICS Perform. Evaluation Rev., 41 (4): 74-77 (2014)Multiresolution Abnormal Trace Detection Using Varied-Length n-Grams and Automata., , , and . IEEE Trans. Syst. Man Cybern. Part C, 37 (1): 86-97 (2007)Fast Indexing for Large-scale Networked System Modeling., , , , and . J. Networks, 4 (8): 734-742 (2009)Ranking the importance of alerts for problem determination in large computer systems., , , and . Clust. Comput., 14 (3): 213-227 (2011)