Author of the publication

Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback.

, , , , , , and . ICASSP, page 2872-2876. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rozzle: De-cloaking Internet Malware., , , and . IEEE Symposium on Security and Privacy, page 443-457. IEEE Computer Society, (2012)Assessment of Virtualization as a Sensor Technique., , , , , and . SADFE, page 61-65. IEEE Computer Society, (2010)An Allosteric Signaling Pathway of Human 3-Phosphoglycerate Kinase from Force Distribution Analysis., , , and . PLoS Computational Biology, (2014)Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots., , and . SAC, page 1426-1432. ACM, (2008)Grid Enabled Internet Instruments., , and . GLOBECOM, page 1906-1911. IEEE, (2007)Dynamic Allostery of the Catabolite Activator Protein Revealed by Interatomic Forces., , , and . PLoS Computational Biology, (2015)Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks., , , , , and . HCI (16), volume 5638 of Lecture Notes in Computer Science, page 138-147. Springer, (2009)Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback., , , , , , and . ICASSP, page 2872-2876. IEEE, (2019)Automating Malware Scanning Using Workflows., , , and . CCGRID, page 562-567. IEEE Computer Society, (2009)ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection., , , and . USENIX Security Symposium, USENIX Association, (2011)