Author of the publication

Identification and prediction of attacks to industrial control systems using temporal point processes.

, , , and . J. Ambient Intell. Humaniz. Comput., 14 (5): 4771-4783 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Information-Theoretic Framework for High-Order Co-clustering of Heterogeneous Objects., , , and . ECML, volume 4212 of Lecture Notes in Computer Science, page 598-605. Springer, (2006)Process Discovery under Precedence Constraints., , , and . ACM Trans. Knowl. Discov. Data, 9 (4): 32:1-32:39 (2015)An Information-Theoretic Framework for High-Order Co-Clustering of Heterogeneous Objects., , and . SEBD, page 397-404. (2007)A Logic-Based Formalism to Model and Analyze Workflow Executions., , and . CAiSE Short Paper Proceedings, volume 74 of CEUR Workshop Proceedings, CEUR-WS.org, (2003)Federated Learning for Medical Images Analysis: A Meta Survey., , and . DASC/PiCom/CBDCom/CyberSciTech, page 531-536. IEEE, (2023)An Effective Approach to Inverse Frequent Set Mining., , and . ICDM, page 806-811. IEEE Computer Society, (2009)Mining Frequent Instances on Workflows., , , and . PAKDD, volume 2637 of Lecture Notes in Computer Science, page 209-221. Springer, (2003)Mining taxonomies of process models., , and . Data Knowl. Eng., 67 (1): 74-102 (2008)Reasoning about Precedence Constraints for Process Mining Applications., , , and . SEBD, page 429-436. Curran Associates, (2013)Reasoning on Workflow Executions., , and . ADBIS, volume 2798 of Lecture Notes in Computer Science, page 205-219. Springer, (2003)