Author of the publication

Combining Knowledge Discovery and Knowledge Engineering to Build IDSs.

, and . Recent Advances in Intrusion Detection, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heterogeneous networking: a new survivability paradigm., , , , and . NSPW, page 33-39. ACM, (2001)Understanding the prevalence and use of alternative plans in malware with network games., , , and . ACSAC, page 1-10. ACM, (2011)Hotspot-based traceback for mobile ad hoc networks., and . Workshop on Wireless Security, page 43-54. ACM, (2005)An assessment of VoIP covert channel threats., and . SecureComm, page 371-380. IEEE, (2007)RecProv: Towards Provenance-Aware User Space Record and Replay., , and . IPAW, volume 9672 of Lecture Notes in Computer Science, page 3-15. Springer, (2016)Measuring and Preventing Supply Chain Attacks on Package Managers., , , , , and . CoRR, (2020)Grappa: A GRAPh PAckage in Java., , and . GD, volume 1353 of Lecture Notes in Computer Science, page 336-343. Springer, (1997)DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection., , , , , and . ACSAC, page 13-27. ACM, (2022)Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising., , , , and . ACM Conference on Computer and Communications Security, page 129-140. ACM, (2014)