Author of the publication

Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND).

, , and . ACM Southeast Regional Conference, page 175-179. ACM, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Parallel Data Mining for Massive Datasets: Parallel Random Forests Classifier., , and . PDPTA, page 1142-1148. CSREA Press, (2005)Detecting Trojans Using Data Mining Techniques., , and . IMTIC, volume 20 of Communications in Computer and Information Science, page 400-411. Springer, (2008)Anti-matter detection: particle physics model for KDD Cup 2004., , and . SIGKDD Explor., 6 (2): 109-112 (2004)1-dimensional splines as building blocks for improving accuracy of risk outcomes models., and . KDD, page 841-846. ACM, (2004)A survey of data mining techniques for malware detection using file features., , and . ACM Southeast Regional Conference, page 509-510. ACM, (2008)Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND)., , and . ACM Southeast Regional Conference, page 175-179. ACM, (2006)The On-Line Survey System for Distance Learning Education at the University of Central Florida.. WebNet, AACE, (1998)Packet- vs. Session-Based Modeling for Intrusion Detection Systems., , and . ITCC (1), page 116-121. IEEE Computer Society, (2005)Analytical Modeling of Data Mining Process Based on Distributed Tuple Space., , and . PDPTA, page 1135-1141. CSREA Press, (2005)A dynamic data mining technique for intrusion detection systems., , and . ACM Southeast Regional Conference (2), page 148-153. ACM, (2005)1-59593-059-0.