Search

Your search keyword '"Pavel Laskov"' showing total 38 results

Search Constraints

Start Over You searched for: Author "Pavel Laskov" Remove constraint Author: "Pavel Laskov" Database OpenAIRE Remove constraint Database: OpenAIRE
38 results on '"Pavel Laskov"'

Search Results

1. Detection of illicit cryptomining using network metadata

2. Towards Understanding the Skill Gap in Cybersecurity

3. Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

4. SoK: The Impact of Unlabelled Data in Cyberthreat Detection

5. Evasion Attacks against Machine Learning at Test Time

6. Anomaly Detection at 'supersonic' Speed

7. Machine learning in adversarial environments

8. Securing IMS against novel threats

9. [Untitled]

10. Practical Evasion of a Learning-Based Classifier: A Case Study

12. Support Vector Machines

13. Static detection of malicious JavaScript-bearing PDF documents

14. Understanding the risk factors of learning in adversarial environments

15. Botzilla

16. TokDoc

17. Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection

18. FPGA vs. Multi-core CPUs vs. GPUs: Hands-On Experience with a Sorting Application

19. A framework for quantitative security analysis of machine learning

20. Visualization and Explanation of Payload-Based Anomaly Detection

21. CLIO — A Cross-Layer Information Service for Overlay Network Optimization

22. An Architecture for Inline Anomaly Detection

23. Learning and Classification of Malware Behavior

24. Automatic feature selection for anomaly detection

25. A Self-learning System for Detection of Anomalous SIP Messages

26. Stopping conditions for exact computation of leave-one-out error in support vector machines

27. Incorporation of Application Layer Protocol Syntax into Anomaly Detection

28. Language models for detection of unknown attacks in network traffic

29. Detecting Unknown Network Attacks Using Language Models

30. Efficient Algorithms for Similarity Measures over Sequential Data: A Look Beyond Kernels

31. Learning Intrusion Detection: Supervised or Unsupervised?

32. Distributed output encoding for multi-class pattern recognition

33. 3d nonrigid motion analysis under small deformations

34. Online SVM learning: from classification to data description and back

36. Recognition approach to gesture language understanding

37. Network attack detection and defense – Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008

38. A factorization method for the classification of infrared spectra

Catalog

Books, media, physical & digital resources