Your selections:
Rees matrix constructions for clustering of data
- Kelarev, Andrei, Watters, Paul, Yearwood, John
Identifying rootkit infections using data mining
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Internet security applications of Grobner-Shirvov bases
- Kelarev, Andrei, Yearwood, John, Watters, Paul
RBACS : Rootkit behavioral analysis and classification system
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
A Grobner-Shirshov Algorithm for Applications in Internet Security
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Ma, Liping, Abawajy, Jemal, Pan, L.
Determining the influence of visual training on EEG activity patterns using association rule mining
- Yan, Fangang, Watters, Paul, Wang, Wei
Fake file detection in P2P networks by consensus and reputation
- Watters, Paul, Layton, Robert
Optimization of classifiers for data mining based on combinatorial semigroups
- Kelarev, Andrei, Yearwood, John, Watters, Paul
Zero-day malware detection based on supervised learning algorithms of API call signatures
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz
Are you sure you would like to clear your session, including search history and login status?