The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christopher Leckie: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
    Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:214-225 [Conf]
  2. Christopher Leckie, Kotagiri Ramamohanarao
    Policies for Sharing Distributed Probabilistic Beliefs. [Citation Graph (0, 0)][DBLP]
    ACSC, 2003, pp:285-290 [Conf]
  3. Kingsly Leung, Christopher Leckie
    Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:333-342 [Conf]
  4. James C. Bezdek, Richard J. Hathaway, Christopher Leckie, Kotagiri Ramamohanarao
    Approximate data mining in very large relational data. [Citation Graph (0, 0)][DBLP]
    ADC, 2006, pp:3-13 [Conf]
  5. Xiaoyuan Qian, James Bailey, Christopher Leckie
    Mining Generalised Emerging Patterns. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2006, pp:295-304 [Conf]
  6. Herman L. Ferrá, Ken Lau, Christopher Leckie, Anderson Tang
    Applying Reinforcement Learning to Packet Scheduling in Routers. [Citation Graph (0, 0)][DBLP]
    IAAI, 2003, pp:79-84 [Conf]
  7. Jeffrey Chan, James Bailey, Christopher Leckie
    Discovering and Summarising Regions of Correlated Spatio-Temporal Change in Evolving Graphs. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:361-365 [Conf]
  8. Christopher Leckie, Kotagiri Ramamohanarao
    Learning to Share Distributed Probabilistic Beliefs. [Citation Graph (0, 0)][DBLP]
    ICML, 2002, pp:371-378 [Conf]
  9. Christopher Leckie, Ingrid Zukerman
    Learning Search Control Rules for Planning: An Inductive Approach. [Citation Graph (0, 0)][DBLP]
    ML, 1991, pp:422-426 [Conf]
  10. Christopher Leckie, Michael Dale
    Locating Faults in Tree-Structured Networks. [Citation Graph (0, 0)][DBLP]
    IJCAI (1), 1997, pp:434-439 [Conf]
  11. Christopher Leckie, Ingrid Zukerman
    An Inductive Approach to Learning Search Control Rules for Planning. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1993, pp:1100-1105 [Conf]
  12. Bhavani Raskutti, Christopher Leckie
    An Evaluation of Criteria for Measuring the Quality of Clusters. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1999, pp:905-910 [Conf]
  13. Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya
    Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    Networking, 2006, pp:1092-1098 [Conf]
  14. Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
    Adjusted Probabilistic Packet Marking for IP Traceback. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2002, pp:697-708 [Conf]
  15. Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
    Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:771-782 [Conf]
  16. Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
    Exploiting Traffic Localities for Efficient Flow State Lookup. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:1133-1145 [Conf]
  17. Joshua Oldmeadow, Siddarth Ravinutala, Christopher Leckie
    Adaptive Clustering for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2004, pp:255-259 [Conf]
  18. Ming Zhao, Christopher Leckie
    The Development of an Interactive Fault Diagnosis Expert System for Telecommunication Applications. [Citation Graph (0, 0)][DBLP]
    PRICAI, 1996, pp:59-70 [Conf]
  19. Christopher Leckie, Ingrid Zukerman
    Inductive Learning of Search Control Rules for Planning. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1998, v:101, n:1-2, pp:63-98 [Journal]
  20. James C. Bezdek, Richard J. Hathaway, Jacalyn M. Huband, Christopher Leckie, Kotagiri Ramamohanarao
    Approximate clustering in very large relational data. [Citation Graph (0, 0)][DBLP]
    Int. J. Intell. Syst., 2006, v:21, n:8, pp:817-841 [Journal]
  21. Siew Cheong Au, Christopher Leckie, Ajeet Parhar, Gerard Wong
    Efficient visualization of large routing topologies. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2004, v:14, n:2, pp:105-118 [Journal]
  22. Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie
    Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:80-89 [Conf]
  23. Y. Al-Hammadi, Christopher Leckie
    Anomaly detection for Internet worms. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2005, pp:133-146 [Conf]
  24. Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
    Survey of network-based defense mechanisms countering the DoS and DDoS problems. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 2007, v:39, n:1, pp:- [Journal]
  25. Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
    Information sharing for distributed intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:877-899 [Journal]

  26. Adapting Spectral Co-clustering to Documents and Terms Using Latent Semantic Analysis. [Citation Graph (, )][DBLP]


  27. Moving shape dynamics: A signal processing perspective. [Citation Graph (, )][DBLP]


  28. CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection. [Citation Graph (, )][DBLP]


  29. Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  30. Tensor Space Learning for Analyzing Activity Patterns from Video Sequences. [Citation Graph (, )][DBLP]


  31. SpecVAT: Enhanced Visual Cluster Analysis. [Citation Graph (, )][DBLP]


  32. The Curse of Ease of Access to the Internet. [Citation Graph (, )][DBLP]


  33. Dual clustering for categorization of action sequences. [Citation Graph (, )][DBLP]


  34. Analysis and enhancement of on-demand routing in wireless sensor networks. [Citation Graph (, )][DBLP]


  35. Characteristic-Based Descriptors for Motion Sequence Recognition. [Citation Graph (, )][DBLP]


  36. Approximate Spectral Clustering. [Citation Graph (, )][DBLP]


  37. iVAT and aVAT: Enhanced Visual Analysis for Cluster Tendency Assessment. [Citation Graph (, )][DBLP]


  38. An evaluation technique for network intrusion detection systems. [Citation Graph (, )][DBLP]


  39. A scalable sampling scheme for clustering in network traffic analysis. [Citation Graph (, )][DBLP]


  40. A probabilistic approach to detecting network scans. [Citation Graph (, )][DBLP]


  41. CPU-based DoS attacks against SIP servers. [Citation Graph (, )][DBLP]


  42. Relieving hot spots in collaborative intrusion detection systems during worm outbreaks. [Citation Graph (, )][DBLP]


  43. Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  44. Characterising the Evolution in Scanning Activity of Suspicious Hosts. [Citation Graph (, )][DBLP]


  45. Exploiting sequence similarity to validate the sensitivity of SNP arrays in detecting fine-scaled copy number variations. [Citation Graph (, )][DBLP]


  46. A survey of coordinated attacks and collaborative intrusion detection. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002