Cited By
View all- Spurling MHu CZhan HSheng V(2022)Anomaly Detection in Crowdsourced Work with Interval-Valued LabelsInformation Processing and Management of Uncertainty in Knowledge-Based Systems10.1007/978-3-031-08971-8_42(504-516)Online publication date: 4-Jul-2022
- Radhakrishna VKumar PJanaki VAljawarneh SAl-Shargabi B(2015)A Temporal Pattern Mining Based Approach for Intrusion Detection Using Similarity MeasureProceedings of the The International Conference on Engineering & MIS 201510.1145/2832987.2833077(1-8)Online publication date: 24-Sep-2015
- Yao DYin MLuo JZhang S(2012)Network Anomaly Detection Using Random Forests and Entropy of Traffic FeaturesProceedings of the 2012 Fourth International Conference on Multimedia Information Networking and Security10.1109/MINES.2012.146(926-929)Online publication date: 2-Nov-2012
- Show More Cited By