Author of the publication

Distributed PCA and Network Anomaly Detection

, , , , , and . UCB/EECS-2006-99. EECS Department, University of California, Berkeley, (July 2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Macroscope: end-point approach to networked application dependency discovery., , , , and . CoNEXT, page 229-240. ACM, (2009)Spectral Clustering with Perturbed Data., , , and . NIPS, page 705-712. Curran Associates, Inc., (2008)In-Network PCA and Anomaly Detection., , , , , and . NIPS, page 617-624. MIT Press, (2006)Hark: A Deep Learning System for Navigating Privacy Feedback at Scale., , , , and . SP, page 2469-2486. IEEE, (2022)Can coexisting overlays inadvertently step on each other?, , , and . ICNP, page 201-214. IEEE Computer Society, (2005)Distributed PCA and Network Anomaly Detection, , , , , and . UCB/EECS-2006-99. EECS Department, University of California, Berkeley, (July 2006)Mixture Models of Endhost Network Traffic, , , , and . CoRR, (2012)Maximum entropy models: convergence rates and applications in dynamic system monitoring., , and . ISIT, page 168. IEEE, (2004)Stealthy poisoning attacks on PCA-based anomaly detectors., , , , , , , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 73-74 (2009)Reducing Permission Requests in Mobile Apps., , , , , , and . Internet Measurement Conference, page 259-266. ACM, (2019)