Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/isi/GuptaHGFLM13
%A Gupta, Siddharth
%A Hanson, Casey
%A Gunter, Carl A.
%A Frank, Mario
%A Liebovitz, David M.
%A Malin, Bradley
%B ISI
%D 2013
%E Glass, Kristin
%E Colbaugh, Richard
%E Sanfilippo, Antonio
%E Kao, Anne
%E Gabbay, Michael
%E Corley, Courtney
%E Li, Jiexun
%E Khan, Latifur
%E Wynne, Adam
%E Coote, Lisa
%E Mao, Wenji
%E Zeng, Daniel
%E Yaghoobi, Ahmad
%I IEEE
%K dblp
%P 100-105
%T Modeling and detecting anomalous topic access.
%U http://dblp.uni-trier.de/db/conf/isi/isi2013.html#GuptaHGFLM13
%@ 978-1-4673-6214-6
@inproceedings{conf/isi/GuptaHGFLM13,
added-at = {2013-08-26T00:00:00.000+0200},
author = {Gupta, Siddharth and Hanson, Casey and Gunter, Carl A. and Frank, Mario and Liebovitz, David M. and Malin, Bradley},
biburl = {https://puma.ub.uni-stuttgart.de/bibtex/2aee9630664e5672359b49172d2ed765c/dblp},
booktitle = {ISI},
crossref = {conf/isi/2013},
editor = {Glass, Kristin and Colbaugh, Richard and Sanfilippo, Antonio and Kao, Anne and Gabbay, Michael and Corley, Courtney and Li, Jiexun and Khan, Latifur and Wynne, Adam and Coote, Lisa and Mao, Wenji and Zeng, Daniel and Yaghoobi, Ahmad},
ee = {http://dx.doi.org/10.1109/ISI.2013.6578795},
interhash = {64b1cb10f60628238a1995a4f2644079},
intrahash = {aee9630664e5672359b49172d2ed765c},
isbn = {978-1-4673-6214-6},
keywords = {dblp},
pages = {100-105},
publisher = {IEEE},
timestamp = {2016-02-02T11:28:16.000+0100},
title = {Modeling and detecting anomalous topic access.},
url = {http://dblp.uni-trier.de/db/conf/isi/isi2013.html#GuptaHGFLM13},
year = 2013
}