Christopher Leckie
Orcid: 0000-0002-4388-0517Affiliations:
- University of Melbourne, School of Computing and Information Systems, Australia
According to our database1,
Christopher Leckie
authored at least 317 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Knowl. Data Eng., November, 2024
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of Artificial Mental Imagery.
CoRR, 2024
CoRR, 2024
LabelGen: An Anomaly Label Generative Framework for Enhanced Graph Anomaly Detection.
IEEE Access, 2024
The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2024
Identifying Coordinated Activities on Online Social Networks Using Contrast Pattern Mining.
Proceedings of the International Joint Conference on Neural Networks, 2024
DeCoRTAD: Diffusion Based Conditional Representation Learning for Online Trajectory Anomaly Detection.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Intelligent Data Source Emission Rate Control for Optimising the Performance of Streaming Applications.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024
Proceedings of the AI 2024: Advances in Artificial Intelligence, 2024
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024
2023
Int. J. Comput. Vis., December, 2023
Electrical Model-Free Voltage Calculations Using Neural Networks and Smart Meter Data.
IEEE Trans. Smart Grid, July, 2023
Nat. Mac. Intell., June, 2023
CoRR, 2023
Proceedings of the 2023 SIAM International Conference on Data Mining, 2023
Probabilistic Distributed Intrusion Detection For Zero-Trust Multi-Access Edge Computing.
Proceedings of the NOMS 2023, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Robust Wireless Network Anomaly Detection with Collaborative Adversarial Autoencoders.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 29th International Conference on Principles and Practice of Constraint Programming, 2023
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
An Online Unsupervised Dynamic Window Method to Track Repeating Patterns From Sensor Data.
IEEE Trans. Cybern., 2022
MRMondrian: Scalable Multidimensional Anonymisation for Big Data Privacy Preservation.
IEEE Trans. Big Data, 2022
J. Mach. Learn. Res., 2022
Inf. Sci., 2022
Multi-attention graph neural networks for city-wide bus travel time estimation using limited data.
Expert Syst. Appl., 2022
Annu. Rev. Control., 2022
ENDASh: Embedding Neighbourhood Dissimilarity with Attribute Shuffling for Graph Anomaly Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection.
Proceedings of the Network and System Security - 16th International Conference, 2022
Hybrid Collaborative Architectures For Intrusion Detection In Multi-Access Edge Computing.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the 61st IEEE Conference on Decision and Control, 2022
Proceedings of the Computer Vision - ACCV 2022, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Propagation2Vec: Embedding partial propagation networks for explainable fake news early detection.
Inf. Process. Manag., 2021
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021
Mining Rare Recurring Events in Network Traffic using Second Order Contrast Patterns.
Proceedings of the International Joint Conference on Neural Networks, 2021
Closing the BIG-LID: An Effective Local Intrinsic Dimensionality Defense for Nonlinear Regression Poisoning.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
Embracing Domain Differences in Fake News: Cross-domain Fake News Detection using Multi-modal Data.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
Evaluation of Collaborative Intrusion Detection System Architectures in Mobile Edge Computing.
Mobile Edge Computing, 2021
2020
IEEE Trans. Knowl. Data Eng., 2020
Knowl. Inf. Syst., 2020
Improving Scalability of Contrast Pattern Mining for Network Traffic Using Closed Patterns.
CoRR, 2020
Graph Neural Networks with Continual Learning for Fake News Detection from Social Media.
CoRR, 2020
Proceedings of the 2020 SIAM International Conference on Data Mining, 2020
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing.
Proceedings of the 2020 IFIP Networking Conference, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Discovery of contrast corridors from trajectory data in heterogeneous dynamic cellular networks.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Multi-Attention 3D Residual Neural Network for Origin-Destination Crowd Flow Prediction.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
METEOR: Learning Memory and Time Efficient Representations from Multi-modal Data Streams.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
IEEE Trans. Cybern., 2019
Pattern Recognit., 2019
Knowl. Inf. Syst., 2019
Online cluster validity indices for performance monitoring of streaming data clustering.
Int. J. Intell. Syst., 2019
Power-law Verification for Event Detection at Multi-spatial Scales from Geo-tagged Tweet Streams.
CoRR, 2019
Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.
CoRR, 2019
Linear system security - Detection and correction of adversarial sensor attacks in the noise-free case.
Autom., 2019
IEEE Access, 2019
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Robust and Accurate Short-Term Load Forecasting: A Cluster Oriented Ensemble Learning Approach.
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019
Proceedings of the Database Systems for Advanced Applications, 2019
Proceedings of the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 2019
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 3rd International Conference on Big Data and Internet of Things, 2019
Proceedings of the AI 2019: Advances in Artificial Intelligence, 2019
2018
IEEE Trans. Neural Networks Learn. Syst., 2018
IEEE Trans. Intell. Transp. Syst., 2018
Personalized trip recommendation for tourists based on user interests, points of interest visit durations and visit recency.
Knowl. Inf. Syst., 2018
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2018
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018
Proceedings of the 2018 SIAM International Conference on Data Mining, 2018
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018
Urban Sensing for Anomalous Event Detection: - Distinguishing Between Legitimate Traffic Changes and Abnormal Traffic Variability.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the 2018 Digital Image Computing: Techniques and Applications, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Vis. Comput., 2017
Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2017
Inf. Syst., 2017
Int. J. Intell. Syst., 2017
Linear system security - detection and correction of adversarial attacks in the noise-free case.
CoRR, 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2017
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
A Pattern Tree Based Method for Mining Conditional Contrast Patterns of Multi-source Data.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
LSHiForest: A Generic Framework for Fast Tree Isolation Based Ensemble Anomaly Analysis.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
An efficient visual assessment of cluster tendency tool for large-scale time series data sets.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Proceedings of the Data Mining, 2017
From Shared Subspaces to Shared Landmarks: A Robust Multi-Source Classification Approach.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
IEEE Trans. Knowl. Data Eng., 2016
ACM Trans. Knowl. Discov. Data, 2016
A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Fuzzy Syst., 2016
High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning.
Pattern Recognit., 2016
Network Energy Consumption Assessment of Conventional Mobile Services and Over-the-Top Instant Messaging Applications.
IEEE J. Sel. Areas Commun., 2016
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2016
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016
Proceedings of the 28th Australian Conference on Computer-Human Interaction, 2016
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Anomalous Behavior Detection in Crowded Scenes Using Clustering and Spatio-Temporal Features.
Proceedings of the Intelligent Information Processing VIII, 2016
Trajectory Pattern Identification and Anomaly Detection of Pedestrian Flows Based on Visual Clustering.
Proceedings of the Intelligent Information Processing VIII, 2016
Proceedings of the 23rd International Conference on Pattern Recognition, 2016
Proceedings of the Late-breaking Results, 2016
Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
Proceedings of the 55th IEEE Conference on Decision and Control, 2016
Proceedings of the AI 2016: Advances in Artificial Intelligence, 2016
Proceedings of the Twenty-Sixth International Conference on Automated Planning and Scheduling, 2016
Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Fuzzy Syst., 2015
Pattern Recognit. Lett., 2015
CoRR, 2015
DP1SVM: A dynamic planar one-class support vector machine for Internet of Things environment.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015
Discovering the Impact of Urban Traffic Interventions Using Contrast Mining on Vehicle Trajectory Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015
Local outlier detection for data streams in sensor networks: Revisiting the utility problem invited paper.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015
Personalized Tour Recommendation Based on User Interests and Points of Interest Visit Durations.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Proceedings of the 2015 ACM on International Conference on Multimodal Interaction, Seattle, WA, USA, November 09, 2015
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints.
Proceedings of the Advances in Information Retrieval, 2015
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
Traffic forecasting in complex urban networks: Leveraging big data and machine learning.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
2014
High-Resolution Monitoring of Atmospheric Pollutants Using a System of Low-Cost Sensors.
IEEE Trans. Geosci. Remote. Sens., 2014
Ellipsoidal neighbourhood outlier factor for distributed anomaly detection in resource constrained networks.
Pattern Recognit., 2014
Hyperspherical cluster based distributed anomaly detection in wireless sensor networks.
J. Parallel Distributed Comput., 2014
Estimating the number of hosts corresponding to an intrusion alert while preserving privacy.
J. Comput. Syst. Sci., 2014
Comput. Networks, 2014
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014
Profiling spatial and temporal behaviour in sensor networks: A case study in energy monitoring.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014
High resolution spatio-temporal monitoring of air pollutants using wireless sensor networks.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014
Evaluating Spectral Unmixing Quality in the Absence of Reference Objects for Time Lapse Fluorescence Microscopy.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014
Spatio-temporal estimation with Bayesian maximum entropy and compressive sensing in communication constrained networks.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the 17th International Conference on Extending Database Technology, 2014
2013
IEEE Trans. Fuzzy Syst., 2013
Pattern Recognit., 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Mining Labelled Tensors by Discovering both their Common and Discriminative Subspaces.
Proceedings of the 13th SIAM International Conference on Data Mining, 2013
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
Proceedings of the FUZZ-IEEE 2013, 2013
Discovering latent blockmodels in sparse and noisy graphs using non-negative matrix factorisation.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
2012
ciForager: Incrementally discovering regions of correlated change in evolving graphs.
ACM Trans. Knowl. Discov. Data, 2012
Proceedings of the 4th Asian Conference on Machine Learning, 2012
Neurocomputing, 2012
FSR: feature set reduction for scalable and accurate multi-class cancer subtype classification based on copy number.
Bioinform., 2012
Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity.
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012
Measures for clustering and anomaly detection in sets of higher dimensional ellipsoids.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Utilizing common substructures to speedup tensor factorization for mining dynamic graphs.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
An Efficient Adversarial Learning Strategy for Constructing Robust Classification Boundaries.
Proceedings of the AI 2012: Advances in Artificial Intelligence, 2012
2011
Pattern Recognit., 2011
An efficient hyperellipsoidal clustering algorithm for resource-constrained environments.
Pattern Recognit., 2011
IET Wirel. Sens. Syst., 2011
Self-similar characteristics of network intrusion attempts and the implications for predictability.
Concurr. Comput. Pract. Exp., 2011
IEEE Comput. Intell. Mag., 2011
BMC Bioinform., 2011
Proceedings of the Australasian Telecommunication Networks and Applications Conference, 2011
Incremental Elliptical Boundary Estimation for Anomaly Detection in Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
IEEE Trans. Knowl. Data Eng., 2010
Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks.
IEEE Trans. Inf. Forensics Secur., 2010
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic.
J. Netw. Comput. Appl., 2010
Comput. Secur., 2010
A bi-ordering approach to linking gene expression with clinical annotations in gastric cancer.
BMC Bioinform., 2010
Exploiting sequence similarity to validate the sensitivity of SNP arrays in detecting fine-scaled copy number variations.
Bioinform., 2010
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the FUZZ-IEEE 2010, 2010
2009
IEEE Trans. Knowl. Data Eng., 2009
Decentralized multi-dimensional alert correlation for collaborative intrusion detection.
J. Netw. Comput. Appl., 2009
Using graph partitioning to discover regions of correlated spatio-temporal change in evolving graphs.
Intell. Data Anal., 2009
IEEE Commun. Lett., 2009
Proceedings of the IEEE Workshop on Applications of Computer Vision (WACV 2009), 2009
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the 4th International Conference on Autonomous Robots and Agents, 2009
Proceedings of the Eighth Australasian Data Mining Conference, AusDM 2009, Melbourne, 2009
Adapting Spectral Co-clustering to Documents and Terms Using Latent Semantic Analysis.
Proceedings of the AI 2009: Advances in Artificial Intelligence, 2009
2008
An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis.
IEEE Trans. Knowl. Data Eng., 2008
Knowl. Inf. Syst., 2008
Int. J. Intell. Syst., 2008
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008
Relieving hot spots in collaborative intrusion detection systems during worm outbreaks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the 3rd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2008
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the 11th International Conference on Information Fusion, 2008
Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 2008
2007
J. Netw. Comput. Appl., 2007
ACM Comput. Surv., 2007
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection.
Proceedings of the Integrated Network Management, 2007
Proceedings of the 15th IEEE International Conference on Networks, 2007
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007
Proceedings of IEEE International Conference on Communications, 2007
2006
Int. J. Distributed Sens. Networks, 2006
Proceedings of the NETWORKING 2006, 2006
Proceedings of the 1st International Conference on Scalable Information Systems, 2006
Discovering and Summarising Regions of Correlated Spatio-Temporal Change in Evolving Graphs.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006
Proceedings of the Database Technologies 2006, 2006
2005
Proceedings of the NETWORKING 2005: Networking Technologies, 2005
Proceedings of the Integrated Network Management, 2005
Proceedings of the Computer Science 2005, 2005
2004
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring.
Proceedings of the NETWORKING 2004, 2004
2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Protection from distributed denial of service attacks using history-based IP filtering.
Proceedings of IEEE International Conference on Communications, 2003
Proceedings of the Fifteenth Conference on Innovative Applications of Artificial Intelligence, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Computer Science 2003, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Management Solutions for the New Communications World, 2002
Proceedings of the NETWORKING 2002, 2002
Learning to Share Distributed Probabilistic Beliefs.
Proceedings of the Machine Learning, 2002
1999
Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1999
1998
1997
A Multi-Agent System for Distributed Fault Diagnosis.
Proceedings of the Second International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1997
Locating Faults in Tree-Structured Networks.
Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence, 1997
1996
The Development of an Interactive Fault Diagnosis Expert System for Telecommunication Applications.
Proceedings of the PRICAI'96: Topics in Artificial Intelligence, 1996
1993
An Inductive Approach to Learning Search Control Rules for Planning.
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993
1991
Proceedings of the Eighth International Workshop (ML91), 1991