The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Pavel Laskov: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pavel Laskov, Chandra Kambhamettu
    Comparison of 3D Algorithms for Non-rigid Motion and Correspondence Estimation. [Citation Graph (0, 0)][DBLP]
    BMVC, 2001, pp:- [Conf]
  2. Konrad Rieck, Pavel Laskov, Klaus-Robert Müller
    Efficient Algorithms for Similarity Measures over Sequential Data: A Look Beyond Kernels. [Citation Graph (0, 0)][DBLP]
    DAGM-Symposium, 2006, pp:374-383 [Conf]
  3. Pavel Laskov, Christin Schäfer, Igor V. Kotenko
    Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:71-82 [Conf]
  4. Konrad Rieck, Pavel Laskov
    Detecting Unknown Network Attacks Using Language Models. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:74-90 [Conf]
  5. Caspar von Wrede, Pavel Laskov
    Using classification to determine the number of finger strokes on a multi-touch tactile device. [Citation Graph (0, 0)][DBLP]
    ESANN, 2004, pp:549-554 [Conf]
  6. Roman Erenshteyn, Pavel Laskov, David M. Saxe, Richard A. Foulds
    Distributed Output Encoding for Multi-Class Pattern Recognition. [Citation Graph (0, 0)][DBLP]
    ICIAP, 1999, pp:229-234 [Conf]
  7. Pavel Laskov, Patrick Düssel, Christin Schäfer, Konrad Rieck
    Learning Intrusion Detection: Supervised or Unsupervised?. [Citation Graph (0, 0)][DBLP]
    ICIAP, 2005, pp:50-57 [Conf]
  8. Pavel Laskov
    An Improved Decomposition Algorithm for Regression Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    NIPS, 1999, pp:484-490 [Conf]
  9. Pavel Laskov, Konrad Rieck, Christin Schäfer, Klaus-Robert Müller
    Visualization of anomaly detection using prediction sensitivity. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:197-208 [Conf]
  10. Chandra Kambhamettu, Dmitry B. Goldgof, Matthew He, Pavel Laskov
    3D nonrigid motion analysis under small deformations. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 2003, v:21, n:3, pp:229-245 [Journal]
  11. Andreas Ziehe, Pavel Laskov, Guido Nolte, Klaus-Robert Müller
    A Fast Algorithm for Joint Diagonalization with Non-orthogonal Transformations and its Application to Blind Source Separation. [Citation Graph (0, 0)][DBLP]
    Journal of Machine Learning Research, 2004, v:5, n:, pp:777-800 [Journal]
  12. Pavel Laskov, Christian Gehl, Stefan Krüger, Klaus-Robert Müller
    Incremental Support Vector Learning: Analysis, Implementation and Applications. [Citation Graph (0, 0)][DBLP]
    Journal of Machine Learning Research, 2006, v:7, n:, pp:1909-1936 [Journal]
  13. Pavel Laskov
    Feasible Direction Decomposition Algorithms for Training Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 2002, v:46, n:1-3, pp:315-349 [Journal]
  14. Pavel Laskov, Chandra Kambhamettu
    Curvature-Based Algorithms for Nonrigid Motion and Correspondence Estimation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2003, v:25, n:10, pp:1349-1354 [Journal]
  15. Konrad Rieck, Pavel Laskov, Sören Sonnenburg
    Computation of Similarity Measures for Sequential Data using Generalized Suffix Trees. [Citation Graph (0, 0)][DBLP]
    NIPS, 2006, pp:1177-1184 [Conf]
  16. Konrad Rieck, Pavel Laskov
    Language models for detection of unknown attacks in network traffic. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:2, n:4, pp:243-256 [Journal]
  17. Eric Filiol, Roland Büschkes, Pavel Laskov
    Foreword. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:2, n:4, pp:241-242 [Journal]

  18. Automatic feature selection for anomaly detection. [Citation Graph (, )][DBLP]


  19. A framework for quantitative security analysis of machine learning. [Citation Graph (, )][DBLP]


  20. 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]


  21. Learning and Classification of Malware Behavior. [Citation Graph (, )][DBLP]


  22. Vorwort der Workshop-Leitung. [Citation Graph (, )][DBLP]


  23. Incorporation of Application Layer Protocol Syntax into Anomaly Detection. [Citation Graph (, )][DBLP]


  24. Stopping conditions for exact computation of leave-one-out error in support vector machines. [Citation Graph (, )][DBLP]


  25. CLIO - A Cross-Layer Information Service for Overlay Network Optimization. [Citation Graph (, )][DBLP]


  26. Botzilla: detecting the "phoning home" of malicious software. [Citation Graph (, )][DBLP]


  27. TokDoc: a self-healing web application firewall. [Citation Graph (, )][DBLP]


  28. Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection. [Citation Graph (, )][DBLP]


  29. A Self-learning System for Detection of Anomalous SIP Messages. [Citation Graph (, )][DBLP]


  30. Securing IMS against novel threats. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002