If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • Conference contribution

    Auto Semi-supervised Outlier Detection for Malicious Authentication Events

    Kaiafas, G., Hammerschmidt, C., Lagraa, S. & State, R., 2020, Machine Learning and Knowledge Discovery in Databases - International Workshops of ECML PKDD 2019, Proceedings. Cellier, P. & Driessens, K. (eds.). Part II ed. Cham: Springer, p. 176-190 15 p. (Communications in Computer and Information Science; vol. 1168 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Behavioral Clustering of Non-Stationary IP Flow Record Data

    Hammerschmidt, C., Marchal, S., State, R. & Verwer, S., Nov 2016, 12th International Conference on Network and Service Management CNSM 2016. Piscataway, NJ: IEEE, p. 253-257 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Efficient Learning of Communication Profiles from IP Flow Records

    Hammerschmidt, C., Marchal, S., State, R., Pellegrino, N. & Verwer, S., 2016, Proceedings - 2016 IEEE 41st Conference on Local Computer Networks, LCN 2016. Kellenberger, P. (ed.). Los Alamitos, CA: IEEE, p. 1-4 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    18 Downloads (Pure)
  • flexfringe: A Passive Automaton Learning Package

    Verwer, S. & Hammerschmidt, C. A., 2017, 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. O'Conner, L. (ed.). Piscataway: IEEE, p. 638-642 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Flexible State-Merging for learning (P)DFAs in Python

    Hammerschmidt, C., Loos, B., State, R., Engel, T. & Verwer, S., 2016, Proceedings of The 13th International Conference on Grammatical Inference: The JMLR Workshop and Conference, The Sequence PredictIction ChallengE (SPiCe). Verwer, S., van Zaanen, M. & Smetsers, R. (eds.). JMLR, Vol. 57. p. 154-159 6 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Learning behavioral fingerprints from Netflows using Timed Automata

    Pellegrino, N., Lin, Q., Hammerschmidt, C. & Verwer, S., 24 Jul 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Chemouil, P., Monteiro, E., Charalambides, M., Madeira, E., Simoes, P., Secci, S., Gaspary, L. P. & dos Santos, C. R. P. (eds.). IEEE, p. 308-316 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Learning Deterministic Finite Automata from Innite Alphabets

    Pellegrino, N., Hammerschmidt, C., Verwer, S. & Lin, Q., 2016, Proceedings of The 13th International Conference on Grammatical Inference: The JMLR Workshop and Conference, The Sequence PredictIction ChallengE (SPiCe). Verwer, S., van Zaanen, M. & Smetsers, R. (eds.). JMLR, Vol. 57. p. 69-72 5 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Reliable Machine Learning for Networking: Key Issues and Approaches

    Hammerschmidt, C. A., Garcia, S., Verwer, S. & State, R., 2017, 2017 IEEE 42nd conference on Local Computer Networks, LCN 2017. IEEE, p. 167-170 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • The Robust Malware Detection Challenge and Greedy Random Accelerated Multi-Bit Search

    Verwer, S. E., Nadeem, A., Hammerschmidt, C. A., Bliek, L., Al-Dujaili, A. & O’Reilly, U-M., 2020, Workshop on artificial intelligence and security. New York: Association for Computing Machinery (ACM), p. 61-70 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    31 Downloads (Pure)