2009 |
45 | EE | Liang Wang,
Christopher Leckie,
Kotagiri Ramamohanarao,
James C. Bezdek:
Approximate Spectral Clustering.
PAKDD 2009: 134-146 |
44 | EE | Chenfeng Vincent Zhou,
Christopher Leckie,
Shanika Karunasekera:
Collaborative Detection of Fast Flux Phishing Domains.
JNW 4(1): 75-84 (2009) |
2008 |
43 | EE | Liang Wang,
Xin Geng,
Christopher Leckie,
Kotagiri Ramamohanarao:
Moving shape dynamics: A signal processing perspective.
CVPR 2008 |
42 | EE | Sutharshan Rajasegarar,
Christopher Leckie,
Marimuthu Palaniswami:
CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection.
ICC 2008: 1610-1614 |
41 | EE | Liang Wang,
Xin Geng,
James C. Bezdek,
Christopher Leckie,
Kotagiri Ramamohanarao:
SpecVAT: Enhanced Visual Cluster Analysis.
ICDM 2008: 638-647 |
40 | EE | Joanna Cheng,
Liang Wang,
Christopher Leckie:
Dual clustering for categorization of action sequences.
ICPR 2008: 1-4 |
39 | EE | Ming Luo,
Tao Peng,
Christopher Leckie:
CPU-based DoS attacks against SIP servers.
NOMS 2008: 41-48 |
38 | EE | Chenfeng Vincent Zhou,
Shanika Karunasekera,
Christopher Leckie:
Relieving hot spots in collaborative intrusion detection systems during worm outbreaks.
NOMS 2008: 49-56 |
37 | EE | Liang Wang,
Xiaozhe Wang,
Christopher Leckie,
Kotagiri Ramamohanarao:
Characteristic-Based Descriptors for Motion Sequence Recognition.
PAKDD 2008: 369-380 |
36 | EE | Daniel Peter Dallas,
Christopher Leckie,
Kotagiri Ramamohanarao:
Analysis and enhancement of on-demand routing in wireless sensor networks.
PM2HW2N 2008: 173-179 |
35 | EE | Abdun Naser Mahmood,
Christopher Leckie,
Parampalli Udaya:
An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis.
IEEE Trans. Knowl. Data Eng. 20(6): 752-767 (2008) |
34 | EE | Liang Wang,
James C. Bezdek,
Christopher Leckie,
Kotagiri Ramamohanarao:
Selective sampling for approximate clustering of very large data sets.
Int. J. Intell. Syst. 23(3): 313-331 (2008) |
33 | EE | Jeffrey Chan,
James Bailey,
Christopher Leckie:
Discovering correlated spatio-temporal changes in evolving graphs.
Knowl. Inf. Syst. 16(1): 53-96 (2008) |
2007 |
32 | EE | Sutharshan Rajasegarar,
Christopher Leckie,
Marimuthu Palaniswami,
James C. Bezdek:
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks.
ICC 2007: 3864-3869 |
31 | EE | Liang Wang,
Christopher Leckie,
Xiaozhe Wang,
Kotagiri Ramamohanarao,
James C. Bezdek:
Tensor Space Learning for Analyzing Activity Patterns from Video Sequences.
ICDM Workshops 2007: 63-68 |
30 | EE | Kotagiri Ramamohanarao,
Kapil Kumar Gupta,
Tao Peng,
Christopher Leckie:
The Curse of Ease of Access to the Internet.
ICISS 2007: 234-249 |
29 | EE | Abdun Naser Mahmood,
Christopher Leckie,
Parampalli Udaya:
A scalable sampling scheme for clustering in network traffic analysis.
Infoscale 2007: 38 |
28 | EE | Chenfeng Vincent Zhou,
Shanika Karunasekera,
Christopher Leckie:
Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection.
Integrated Network Management 2007: 80-89 |
27 | EE | Tao Peng,
Christopher Leckie,
Kotagiri Ramamohanarao:
Survey of network-based defense mechanisms countering the DoS and DDoS problems.
ACM Comput. Surv. 39(1): (2007) |
26 | EE | Tao Peng,
Christopher Leckie,
Kotagiri Ramamohanarao:
Information sharing for distributed intrusion detection systems.
J. Network and Computer Applications 30(3): 877-899 (2007) |
2006 |
25 | EE | James C. Bezdek,
Richard J. Hathaway,
Christopher Leckie,
Kotagiri Ramamohanarao:
Approximate data mining in very large relational data.
ADC 2006: 3-13 |
24 | EE | Xiaoyuan Qian,
James Bailey,
Christopher Leckie:
Mining Generalised Emerging Patterns.
Australian Conference on Artificial Intelligence 2006: 295-304 |
23 | EE | Jeffrey Chan,
James Bailey,
Christopher Leckie:
Discovering and Summarising Regions of Correlated Spatio-Temporal Change in Evolving Graphs.
ICDM Workshops 2006: 361-365 |
22 | EE | Dana Zhang,
Christopher Leckie:
An evaluation technique for network intrusion detection systems.
Infoscale 2006: 23 |
21 | EE | Abdun Naser Mahmood,
Christopher Leckie,
Parampalli Udaya:
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis.
Networking 2006: 1092-1098 |
20 | EE | Chong Eik Loo,
Mun Yong Ng,
Christopher Leckie,
Marimuthu Palaniswami:
Intrusion Detection for Routing Attacks in Sensor Networks.
IJDSN 2(4): 313-332 (2006) |
19 | EE | James C. Bezdek,
Richard J. Hathaway,
Jacalyn M. Huband,
Christopher Leckie,
Kotagiri Ramamohanarao:
Approximate clustering in very large relational data.
Int. J. Intell. Syst. 21(8): 817-841 (2006) |
2005 |
18 | EE | Kingsly Leung,
Christopher Leckie:
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters.
ACSC 2005: 333-342 |
17 | EE | Y. Al-Hammadi,
Christopher Leckie:
Anomaly detection for Internet worms.
Integrated Network Management 2005: 133-146 |
16 | EE | Tao Peng,
Christopher Leckie,
Kotagiri Ramamohanarao:
Exploiting Traffic Localities for Efficient Flow State Lookup.
NETWORKING 2005: 1133-1145 |
2004 |
15 | EE | Tao Peng,
Christopher Leckie,
Kotagiri Ramamohanarao:
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring.
NETWORKING 2004: 771-782 |
14 | EE | Joshua Oldmeadow,
Siddarth Ravinutala,
Christopher Leckie:
Adaptive Clustering for Network Intrusion Detection.
PAKDD 2004: 255-259 |
13 | EE | Siew Cheong Au,
Christopher Leckie,
Ajeet Parhar,
Gerard Wong:
Efficient visualization of large routing topologies.
Int. Journal of Network Management 14(2): 105-118 (2004) |
2003 |
12 | EE | Tao Peng,
Christopher Leckie,
Kotagiri Ramamohanarao:
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs.
ACISP 2003: 214-225 |
11 | EE | Christopher Leckie,
Kotagiri Ramamohanarao:
Policies for Sharing Distributed Probabilistic Beliefs.
ACSC 2003: 285-290 |
10 | | Herman L. Ferrá,
Ken Lau,
Christopher Leckie,
Anderson Tang:
Applying Reinforcement Learning to Packet Scheduling in Routers.
IAAI 2003: 79-84 |
2002 |
9 | | Christopher Leckie,
Kotagiri Ramamohanarao:
Learning to Share Distributed Probabilistic Beliefs.
ICML 2002: 371-378 |
8 | EE | Tao Peng,
Christopher Leckie,
Kotagiri Ramamohanarao:
Adjusted Probabilistic Packet Marking for IP Traceback.
NETWORKING 2002: 697-708 |
7 | EE | Christopher Leckie,
Kotagiri Ramamohanarao:
A probabilistic approach to detecting network scans.
NOMS 2002: 359-372 |
1999 |
6 | | Bhavani Raskutti,
Christopher Leckie:
An Evaluation of Criteria for Measuring the Quality of Clusters.
IJCAI 1999: 905-910 |
1998 |
5 | EE | Christopher Leckie,
Ingrid Zukerman:
Inductive Learning of Search Control Rules for Planning.
Artif. Intell. 101(1-2): 63-98 (1998) |
1997 |
4 | | Christopher Leckie,
Michael Dale:
Locating Faults in Tree-Structured Networks.
IJCAI (1) 1997: 434-439 |
1996 |
3 | | Ming Zhao,
Christopher Leckie:
The Development of an Interactive Fault Diagnosis Expert System for Telecommunication Applications.
PRICAI 1996: 59-70 |
1993 |
2 | | Christopher Leckie,
Ingrid Zukerman:
An Inductive Approach to Learning Search Control Rules for Planning.
IJCAI 1993: 1100-1105 |
1991 |
1 | | Christopher Leckie,
Ingrid Zukerman:
Learning Search Control Rules for Planning: An Inductive Approach.
ML 1991: 422-426 |