Theo dõi
Christopher Leckie
Christopher Leckie
Professor, Computing and Information Systems, The University of Melbourne
Email được xác minh tại unimelb.edu.au
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning
SM Erfani, S Rajasegarar, S Karunasekera, C Leckie
Pattern Recognition 58, 121-134, 2016
12062016
Survey of network-based defense mechanisms countering the DoS and DDoS problems
T Peng, C Leckie, K Ramamohanarao
ACM Computing Surveys (CSUR) 39 (1), 3-es, 2007
10972007
Fuzzy c-means algorithms for very large data
TC Havens, JC Bezdek, C Leckie, LO Hall, M Palaniswami
IEEE Transactions on Fuzzy Systems 20 (6), 1130-1146, 2012
5862012
Unsupervised anomaly detection in network intrusion detection using clusters
K Leung, C Leckie
Proceedings of the Twenty-eighth Australasian conference on Computer Science …, 2005
5612005
A survey of coordinated attacks and collaborative intrusion detection
CV Zhou, C Leckie, S Karunasekera
computers & security 29 (1), 124-140, 2010
5192010
Protection from distributed denial of service attacks using history-based IP filtering
T Peng, C Leckie, K Ramamohanarao
IEEE International Conference on Communications, 2003. ICC'03. 1, 482-486, 2003
4242003
Anomaly detection in wireless sensor networks
S Rajasegarar, C Leckie, M Palaniswami
IEEE Wireless Communications 15 (4), 34-40, 2008
3792008
Distributed anomaly detection in wireless sensor networks
S Rajasegarar, C Leckie, M Palaniswami, JC Bezdek
2006 10th IEEE Singapore international conference on communication systems, 1-5, 2006
3682006
Intrusion detection for routing attacks in sensor networks
CE Loo, MY Ng, C Leckie, M Palaniswami
International Journal of Distributed Sensor Networks 2 (4), 313-332, 2006
3292006
Parking availability prediction for sensor-enabled car parks in smart cities
Y Zheng, S Rajasegarar, C Leckie
2015 IEEE tenth international conference on intelligent sensors, sensor …, 2015
3032015
Proactively detecting distributed denial of service attacks using source IP address monitoring
T Peng, C Leckie, K Ramamohanarao
Networking 2004: Networking Technologies, Services, and Protocols …, 2004
2732004
Quarter sphere based distributed anomaly detection in wireless sensor networks
S Rajasegarar, C Leckie, M Palaniswami, JC Bezdek
2007 IEEE International Conference on Communications, 3864-3869, 2007
2582007
Using virtual machine allocation policies to defend against co-resident attacks in cloud computing
Y Han, J Chan, T Alpcan, C Leckie
IEEE Transactions on Dependable and Secure Computing 14 (1), 95-108, 2015
2212015
Personalized tour recommendation based on user interests and points of interest visit durations
KH Lim, J Chan, C Leckie, S Karunasekera
Twenty-Fourth International Joint Conference on Artificial Intelligence …, 2015
2112015
Personalized trip recommendation for tourists based on user interests, points of interest visit durations and visit recency
KH Lim, J Chan, C Leckie, S Karunasekera
Knowledge and Information Systems 54, 375-406, 2018
1912018
Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks
S Rajasegarar, C Leckie, JC Bezdek, M Palaniswami
IEEE Transactions on Information Forensics and Security 5 (3), 518-533, 2010
1852010
Fast memory efficient local outlier detection in data streams
M Salehi, C Leckie, JC Bezdek, T Vaithianathan, X Zhang
IEEE Transactions on Knowledge and Data Engineering 28 (12), 3246-3260, 2016
1822016
Adjusted probabilistic packet marking for IP traceback
T Peng, C Leckie, K Ramamohanarao
NETWORKING 2002: Networking Technologies, Services, and Protocols …, 2002
1662002
Labelled data collection for anomaly detection in wireless sensor networks
S Suthaharan, M Alzahrani, S Rajasegarar, C Leckie, M Palaniswami
2010 sixth international conference on intelligent sensors, sensor networks …, 2010
1602010
Tour recommendation and trip planning using location-based social media: A survey
KH Lim, J Chan, S Karunasekera, C Leckie
Knowledge and Information Systems 60, 1247-1275, 2019
1402019
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20