Author of the publication

Combining Knowledge Discovery and Knowledge Engineering to Build IDSs.

, and . Recent Advances in Intrusion Detection, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ACE: An Expert System for Telephone Cable Maintenance., , , , and . IJCAI, page 116-121. William Kaufmann, (1983)FLIPS: Hybrid Adaptive Intrusion Prevention., , , and . RAID, volume 3858 of Lecture Notes in Computer Science, page 82-101. Springer, (2005)Anomaly Detection in Computer Security and an Application to File System Accesses., , , , and . ISMIS, volume 3488 of Lecture Notes in Computer Science, page 14-28. Springer, (2005)Anomalous Payload-Based Network Intrusion Detection., and . RAID, volume 3224 of Lecture Notes in Computer Science, page 203-222. Springer, (2004)Software decoys for insider threat., and . AsiaCCS, page 93-94. ACM, (2012)On the infeasibility of modeling polymorphic shellcode., , , , and . ACM Conference on Computer and Communications Security, page 541-551. ACM, (2007)Model Aggregation for Distributed Content Anomaly Detection., , and . AISec@CCS, page 61-71. ACM, (2014)Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes., , , and . AISec, page 39-46. ACM, (2009)On the feasibility of online malware detection with performance counters., , , , , , and . ISCA, page 559-570. ACM, (2013)The SPARCHS Project: Hardware Support for Software Security., , , , and . SysSec@DIMVA, page 119-122. IEEE, (2011)