Author of the publication

HMMPayl: An intrusion detection system based on Hidden Markov Models.

, , and . Computers & Security, 30 (4): 221-241 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Theoretical Framework for Dynamic Classifier Selection., and . ICPR, page 2008-2011. IEEE Computer Society, (2000)Passive-aggressive Online Learning for Relevance Feedback in Content based Image Retrieval., , and . ICPRAM, page 182-187. SciTePress, (2013)HMMPayl: an application of HMM to the analysis of the HTTP Payload., and . WAPA, volume 11 of JMLR Proceedings, page 81-87. JMLR.org, (2010)Alarm Clustering for Intrusion Detection Systems in Computer Networks., , and . MLDM, volume 3587 of Lecture Notes in Computer Science, page 184-193. Springer, (2005)Sensing Attacks in Computers Networks with Hidden Markov Models., , and . MLDM, volume 4571 of Lecture Notes in Computer Science, page 449-463. Springer, (2007)Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method., , and . MLDM, volume 5632 of Lecture Notes in Computer Science, page 163-177. Springer, (2009)Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication., , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 1018-1025. Springer, (2005)Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis., , , , and . ITASEC, volume 1816 of CEUR Workshop Proceedings, page 96-105. CEUR-WS.org, (2017)Security Evaluation of Support Vector Machines in Adversarial Environments., , , , , , , and . CoRR, (2014)Evasion Attacks against Machine Learning at Test Time., , , , , , , and . CoRR, (2017)