Author:
Bruns-Smith David,Baskaran Muthu M.,Ezick James,Henretty Tom,Lethin Richard
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization;Digital Threats: Research and Practice;2023-03-07
2. Efficient, out-of-memory sparse MTTKRP on massively parallel architectures;Proceedings of the 36th ACM International Conference on Supercomputing;2022-06-28
3. Visualization of Data Cubes for Anomaly Detection in Network Traffic Data Streams;2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS);2021-09-22
4. A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System Protocol;Proceedings of the 2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security;2020-12-07
5. An interactive visual analytics approach for network anomaly detection through smart labeling;Journal of Visualization;2019-09-03