Search the dblp DataBase
Alexandr Seleznyov :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Alexandr Seleznyov , Stephen Hailes An Access Control Model Based on Distributed Knowledge Management. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:403-406 [Conf ] Alexandr Seleznyov , Seppo Puuronen HIDSUR: A Hybrid Intrusion Detection System Based on Real-Time User Recognition. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 2000, pp:41-45 [Conf ] Oleksiy Mazhelis , Alexandr Seleznyov , Seppo Puuronen A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:149-164 [Conf ] Alexandr Seleznyov , Stephen Hailes Distributed Knowledge Management for Autonomous Access Control in Computer Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:433-437 [Conf ] Alexandr Seleznyov , Oleksiy Mazhelis , Seppo Puuronen Learning Temporal Regularities of User Behavior for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:143-152 [Conf ] Alexandr Seleznyov , Seppo Puuronen Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Alexandr Seleznyov , Oleksiy Mazhelis Learning temporal patterns for anomaly intrusion detection. [Citation Graph (0, 0)][DBLP ] SAC, 2002, pp:209-213 [Conf ] Alexandr Seleznyov A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:339-352 [Conf ] Alexandr Seleznyov , Seppo Puuronen Using continuous user authentication to detect masqueraders. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:3, pp:139-145 [Journal ] Search in 0.001secs, Finished in 0.002secs