|
Search the dblp DataBase
Christopher Leckie:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:214-225 [Conf]
- Christopher Leckie, Kotagiri Ramamohanarao
Policies for Sharing Distributed Probabilistic Beliefs. [Citation Graph (0, 0)][DBLP] ACSC, 2003, pp:285-290 [Conf]
- Kingsly Leung, Christopher Leckie
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. [Citation Graph (0, 0)][DBLP] ACSC, 2005, pp:333-342 [Conf]
- James C. Bezdek, Richard J. Hathaway, Christopher Leckie, Kotagiri Ramamohanarao
Approximate data mining in very large relational data. [Citation Graph (0, 0)][DBLP] ADC, 2006, pp:3-13 [Conf]
- Xiaoyuan Qian, James Bailey, Christopher Leckie
Mining Generalised Emerging Patterns. [Citation Graph (0, 0)][DBLP] Australian Conference on Artificial Intelligence, 2006, pp:295-304 [Conf]
- Herman L. Ferrá, Ken Lau, Christopher Leckie, Anderson Tang
Applying Reinforcement Learning to Packet Scheduling in Routers. [Citation Graph (0, 0)][DBLP] IAAI, 2003, pp:79-84 [Conf]
- Jeffrey Chan, James Bailey, Christopher Leckie
Discovering and Summarising Regions of Correlated Spatio-Temporal Change in Evolving Graphs. [Citation Graph (0, 0)][DBLP] ICDM Workshops, 2006, pp:361-365 [Conf]
- Christopher Leckie, Kotagiri Ramamohanarao
Learning to Share Distributed Probabilistic Beliefs. [Citation Graph (0, 0)][DBLP] ICML, 2002, pp:371-378 [Conf]
- Christopher Leckie, Ingrid Zukerman
Learning Search Control Rules for Planning: An Inductive Approach. [Citation Graph (0, 0)][DBLP] ML, 1991, pp:422-426 [Conf]
- Christopher Leckie, Michael Dale
Locating Faults in Tree-Structured Networks. [Citation Graph (0, 0)][DBLP] IJCAI (1), 1997, pp:434-439 [Conf]
- Christopher Leckie, Ingrid Zukerman
An Inductive Approach to Learning Search Control Rules for Planning. [Citation Graph (0, 0)][DBLP] IJCAI, 1993, pp:1100-1105 [Conf]
- Bhavani Raskutti, Christopher Leckie
An Evaluation of Criteria for Measuring the Quality of Clusters. [Citation Graph (0, 0)][DBLP] IJCAI, 1999, pp:905-910 [Conf]
- Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis. [Citation Graph (0, 0)][DBLP] Networking, 2006, pp:1092-1098 [Conf]
- Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
Adjusted Probabilistic Packet Marking for IP Traceback. [Citation Graph (0, 0)][DBLP] NETWORKING, 2002, pp:697-708 [Conf]
- Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. [Citation Graph (0, 0)][DBLP] NETWORKING, 2004, pp:771-782 [Conf]
- Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
Exploiting Traffic Localities for Efficient Flow State Lookup. [Citation Graph (0, 0)][DBLP] NETWORKING, 2005, pp:1133-1145 [Conf]
- Joshua Oldmeadow, Siddarth Ravinutala, Christopher Leckie
Adaptive Clustering for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP] PAKDD, 2004, pp:255-259 [Conf]
- Ming Zhao, Christopher Leckie
The Development of an Interactive Fault Diagnosis Expert System for Telecommunication Applications. [Citation Graph (0, 0)][DBLP] PRICAI, 1996, pp:59-70 [Conf]
- Christopher Leckie, Ingrid Zukerman
Inductive Learning of Search Control Rules for Planning. [Citation Graph (0, 0)][DBLP] Artif. Intell., 1998, v:101, n:1-2, pp:63-98 [Journal]
- James C. Bezdek, Richard J. Hathaway, Jacalyn M. Huband, Christopher Leckie, Kotagiri Ramamohanarao
Approximate clustering in very large relational data. [Citation Graph (0, 0)][DBLP] Int. J. Intell. Syst., 2006, v:21, n:8, pp:817-841 [Journal]
- Siew Cheong Au, Christopher Leckie, Ajeet Parhar, Gerard Wong
Efficient visualization of large routing topologies. [Citation Graph (0, 0)][DBLP] Int. Journal of Network Management, 2004, v:14, n:2, pp:105-118 [Journal]
- Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie
Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2007, pp:80-89 [Conf]
- Y. Al-Hammadi, Christopher Leckie
Anomaly detection for Internet worms. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2005, pp:133-146 [Conf]
- Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
Survey of network-based defense mechanisms countering the DoS and DDoS problems. [Citation Graph (0, 0)][DBLP] ACM Comput. Surv., 2007, v:39, n:1, pp:- [Journal]
- Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
Information sharing for distributed intrusion detection systems. [Citation Graph (0, 0)][DBLP] J. Network and Computer Applications, 2007, v:30, n:3, pp:877-899 [Journal]
Adapting Spectral Co-clustering to Documents and Terms Using Latent Semantic Analysis. [Citation Graph (, )][DBLP]
Moving shape dynamics: A signal processing perspective. [Citation Graph (, )][DBLP]
CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection. [Citation Graph (, )][DBLP]
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Tensor Space Learning for Analyzing Activity Patterns from Video Sequences. [Citation Graph (, )][DBLP]
SpecVAT: Enhanced Visual Cluster Analysis. [Citation Graph (, )][DBLP]
The Curse of Ease of Access to the Internet. [Citation Graph (, )][DBLP]
Dual clustering for categorization of action sequences. [Citation Graph (, )][DBLP]
Analysis and enhancement of on-demand routing in wireless sensor networks. [Citation Graph (, )][DBLP]
Characteristic-Based Descriptors for Motion Sequence Recognition. [Citation Graph (, )][DBLP]
Approximate Spectral Clustering. [Citation Graph (, )][DBLP]
iVAT and aVAT: Enhanced Visual Analysis for Cluster Tendency Assessment. [Citation Graph (, )][DBLP]
An evaluation technique for network intrusion detection systems. [Citation Graph (, )][DBLP]
A scalable sampling scheme for clustering in network traffic analysis. [Citation Graph (, )][DBLP]
A probabilistic approach to detecting network scans. [Citation Graph (, )][DBLP]
CPU-based DoS attacks against SIP servers. [Citation Graph (, )][DBLP]
Relieving hot spots in collaborative intrusion detection systems during worm outbreaks. [Citation Graph (, )][DBLP]
Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Characterising the Evolution in Scanning Activity of Suspicious Hosts. [Citation Graph (, )][DBLP]
Exploiting sequence similarity to validate the sensitivity of SNP arrays in detecting fine-scaled copy number variations. [Citation Graph (, )][DBLP]
A survey of coordinated attacks and collaborative intrusion detection. [Citation Graph (, )][DBLP]
Search in 0.009secs, Finished in 0.011secs
|