Author of the publication

An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications.

, , and . ICMLA (2), page 54-59. IEEE, (2013)978-0-7695-5144-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications., , and . ICMLA (2), page 54-59. IEEE, (2013)978-0-7695-5144-9.An information fusion framework for threat assessment., , and . FUSION, page 1903-1910. IEEE, (2009)How do information security workers use host data? A summary of interviews with security analysts., , , and . CoRR, (2018)The effects of development team skill on software product quality., and . ACM SIGSOFT Software Engineering Notes, 31 (3): 1-5 (2006)Spatial Data Analysis as a Software Quality Modeling Technique., and . SEKE, page 74-77. (2003)A Stigmergy Approach for Open Source Software Developer Community Simulation., , , , and . CSE (4), page 602-606. IEEE Computer Society, (2009)ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention., , , and . ICCSA (4), volume 7336 of Lecture Notes in Computer Science, page 646-653. Springer, (2012)Predicting software suitability using a Bayesian belief network., , and . ICMLA, IEEE Computer Society, (2005)Classification of Distributed Data Using Topic Modeling and Maximum Variation Sampling., , and . HICSS, page 1-5. IEEE Computer Society, (2011)An approach to the automated determination of host information value., , and . CICS, page 92-99. IEEE, (2011)