Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses., , , , and . RAID, volume 2516 of Lecture Notes in Computer Science, page 36-53. Springer, (2002)LPS Algorithms., , and . FGCS, page 436-448. OHMSHA Ltd. Tokyo and North-Holland, (1984)A holistic approach to service survivability., , , , , , , and . SSRS@CCS, page 11-22. ACM, (2003)CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management., , and . USENIX Security Symposium, page 1057-1074. USENIX Association, (2017)Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic., , and . NDSS, The Internet Society, (2009)Incremental Evaluation of Rules and its Relationship to Parallelism., , , and . SIGMOD Conference, page 78-87. ACM Press, (1991)SIGMOD Record 20(2), June 1991.Minimal Cost Complexity Pruning of Meta-Classifiers., and . AAAI/IAAI, page 979. AAAI Press / The MIT Press, (1999)Using artificial anomalies to detect unknown and known network intrusions., , , , and . Knowl. Inf. Syst., 6 (5): 507-527 (2004)Decoy Document Deployment for Effective Masquerade Attack Detection., and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 35-54. Springer, (2011)A coding approach to event correlation., , , , and . Integrated Network Management, volume 11 of IFIP Conference Proceedings, page 266-277. Chapman & Hall, (1995)