Author of the publication

Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs.

, , , and . IEEE Trans. Systems, Man, and Cybernetics, Part C, 42 (6): 1579-1589 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Effective Word Embedding using Morphological Word Similarity., , , , and . CoRR, (2014)Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs., , , and . IEEE Trans. Systems, Man, and Cybernetics, Part C, 42 (6): 1579-1589 (2012)Finding the right facts in the crowd: factoid question answering over social media., , , and . WWW, page 467-476. ACM, (2008)Learning to recognize reliable users and content in social media with coupled mutual reinforcement., , , , and . WWW, page 51-60. ACM, (2009)A role-based secure group communication framework., , , , and . SoSE, page 1-6. IEEE, (2008)JigDFS for Implementing Secure Container Communities., , and . SMC, page 3651-3654. IEEE, (2009)Design of a Lattice-based Access Control Scheme., , , , , , , , , and . SMC, page 68-73. IEEE, (2009)A methodology for empirical analysis of brain connectivity through graph mining., , , , , and . SMC, page 2963-2969. IEEE, (2011)Comparison of PIN- and pattern-based behavioral biometric authentication on mobile devices., , , , , and . MILCOM, page 1317-1322. IEEE, (2015)Selected articles from the Third International Workshop on Semantics-Powered Data Analytics (SEPDA 2018)., , , and . BMC Med. Inf. & Decision Making, 19-S (4): 148:1-148:3 (2019)