Author of the publication

ANTIDOTE: understanding and defending against poisoning of anomaly detectors.

, , , , , , , and . Internet Measurement Conference, page 1-14. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed PCA and Network Anomaly Detection, , , , , and . UCB/EECS-2006-99. EECS Department, University of California, Berkeley, (July 2006)Mobile computing with the Rover toolkit, , and . IEEE Transactions on Computers, (1997)Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links., , and . MobiCom, page 113-119. ACM, (1999)Building Reliable Mobile-Aware Applications Using the Rover Toolkit., and . MobiCom, page 117-129. ACM, (1996)An Architecture for Secure Wide-Area Service Discovery., , , , and . Wireless Networks, 8 (2-3): 213-230 (2002)Multi-Layer Tracing of TCP over a Reliable Wireless Link., , , , and . SIGMETRICS, page 144-154. ACM, (1999)Mobile computing with the Rover Toolkit.. Massachusetts Institute of Technology, Cambridge, MA, USA, (1998)ndltd.org (oai:dspace.mit.edu:1721.1/46115).The Datacenter Needs an Operating System., , , , , , , and . HotCloud, USENIX Association, (2011)In-Network PCA and Anomaly Detection., , , , , and . NIPS, page 617-624. MIT Press, (2006)A Taxonomy of Cyber Attacks on SCADA Systems., , and . iThings/CPSCom, page 380-388. IEEE Computer Society, (2011)