|
Search the dblp DataBase
Matthew Gebski:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Matthew Gebski, Alex Penev, Raymond K. Wong
Classification of Hidden Network Streams. [Citation Graph (0, 0)][DBLP] DaWaK, 2006, pp:332-341 [Conf]
- Matthew Gebski, Raymond K. Wong
Intrusion Detection via Analysis and Modelling of User Commands. [Citation Graph (0, 0)][DBLP] DaWaK, 2005, pp:388-397 [Conf]
- Matthew Gebski, Raymond K. Wong
A New Approach for Cluster Detection for Large Datasets with High Dimensionality. [Citation Graph (0, 0)][DBLP] DaWaK, 2005, pp:498-508 [Conf]
- Alex Penev, Matthew Gebski, Raymond K. Wong
Topic Distillation in Desktop Search. [Citation Graph (0, 0)][DBLP] DEXA, 2006, pp:478-488 [Conf]
- Matthew Gebski, Alex Penev, Raymond K. Wong
Protocol Identification of Encrypted Network Traffic. [Citation Graph (0, 0)][DBLP] Web Intelligence, 2006, pp:957-960 [Conf]
- Matthew Gebski, Raymond K. Wong
An Efficient Histogram Method for Outlier Detection. [Citation Graph (0, 0)][DBLP] DASFAA, 2007, pp:176-187 [Conf]
Grouping Categorical Anomalies. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|