Author of the publication

Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection.

, , , , , , and . SAC, page 318-327. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On trustworthy measurements when testing dependable systems: a discussion and experiences., and . Int. J. Crit. Comput. Based Syst., 6 (2): 154-170 (2015)Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD., , and . ISSRE, page 446-455. IEEE, (2019)Challenging Anomaly Detection in Complex Dynamic Systems., , and . SRDS, page 213-214. IEEE Computer Society, (2016)On Algorithms Selection for Unsupervised Anomaly Detection., , and . PRDC, page 279-288. IEEE, (2018)Meeting the challenges in the design and evaluation of a trackside real-time safety-critical system., , , and . ISORC, page 1-10. IEEE Computer Society, (2013)A Resilient SIL 2 Driver Machine Interface for Train Control Systems., , , , , and . DepCoS-RELCOMEX, page 365-374. IEEE Computer Society, (2008)Towards a Framework for Self-Adaptive Reliable Network Services in Highly-Uncertain Environments., , , , and . ISORC Workshops, page 184-193. IEEE Computer Society, (2010)On the impact of emergent properties on SoS security., , , and . SoSE, page 1-6. IEEE, (2016)A Service Discovery Approach for Testing Dynamic SOAs., , and . ISORC Workshops, page 133-142. IEEE Computer Society, (2011)A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events., , and . ARES, page 223-228. IEEE Computer Society, (2016)