Author of the publication

Learning Temporal Regularities of User Behavior for Anomaly Detection.

, , and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 143-152. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Impact of Interface Implementation Efforts on the Structure of a Software Market - OSS/BSS Market Polarization Scenario., , and . ICSOFT (SE/MUSE/GSDCA), page 80-87. INSTICC Press, (2008)Hybrid Cloud Architecture for Short Message Services., , , , and . CLOSER, page 489-500. SciTePress, (2012)Cost Efficiency of Hybrid Cloud Storage: Shortening Acquisition Cycle to Mitigate Volume Variation., , and . ICIS, Association for Information Systems, (2015)Role of acquisition intervals in private and public cloud storage costs., , and . Decis. Support Syst., (2014)Evaluating Classifiers for Mobile-Masquerader Detection., , and . SEC, volume 201 of IFIP, page 271-283. Springer, (2006)Information Security Culture: A Survey., and . INC, page 153-157. University of Plymouth, (2010)A framework for evaluating Internet-of-Things platforms: Application provider viewpoint., and . WF-IoT, page 147-152. IEEE Computer Society, (2014)Learning Temporal Regularities of User Behavior for Anomaly Detection., , and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 143-152. Springer, (2001)Real-time recognition of personal routes using instance-based learning.. Intelligent Vehicles Symposium, page 619-624. IEEE, (2011)Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications., , and . Decis. Support Syst., (2014)