dblp.uni-trier.dewww.uni-trier.de

Christopher Leckie

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
45EELiang Wang, Christopher Leckie, Kotagiri Ramamohanarao, James C. Bezdek: Approximate Spectral Clustering. PAKDD 2009: 134-146
44EEChenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera: Collaborative Detection of Fast Flux Phishing Domains. JNW 4(1): 75-84 (2009)
2008
43EELiang Wang, Xin Geng, Christopher Leckie, Kotagiri Ramamohanarao: Moving shape dynamics: A signal processing perspective. CVPR 2008
42EESutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami: CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection. ICC 2008: 1610-1614
41EELiang Wang, Xin Geng, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao: SpecVAT: Enhanced Visual Cluster Analysis. ICDM 2008: 638-647
40EEJoanna Cheng, Liang Wang, Christopher Leckie: Dual clustering for categorization of action sequences. ICPR 2008: 1-4
39EEMing Luo, Tao Peng, Christopher Leckie: CPU-based DoS attacks against SIP servers. NOMS 2008: 41-48
38EEChenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie: Relieving hot spots in collaborative intrusion detection systems during worm outbreaks. NOMS 2008: 49-56
37EELiang Wang, Xiaozhe Wang, Christopher Leckie, Kotagiri Ramamohanarao: Characteristic-Based Descriptors for Motion Sequence Recognition. PAKDD 2008: 369-380
36EEDaniel Peter Dallas, Christopher Leckie, Kotagiri Ramamohanarao: Analysis and enhancement of on-demand routing in wireless sensor networks. PM2HW2N 2008: 173-179
35EEAbdun Naser Mahmood, Christopher Leckie, Parampalli Udaya: An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis. IEEE Trans. Knowl. Data Eng. 20(6): 752-767 (2008)
34EELiang Wang, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao: Selective sampling for approximate clustering of very large data sets. Int. J. Intell. Syst. 23(3): 313-331 (2008)
33EEJeffrey Chan, James Bailey, Christopher Leckie: Discovering correlated spatio-temporal changes in evolving graphs. Knowl. Inf. Syst. 16(1): 53-96 (2008)
2007
32EESutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami, James C. Bezdek: Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks. ICC 2007: 3864-3869
31EELiang Wang, Christopher Leckie, Xiaozhe Wang, Kotagiri Ramamohanarao, James C. Bezdek: Tensor Space Learning for Analyzing Activity Patterns from Video Sequences. ICDM Workshops 2007: 63-68
30EEKotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, Christopher Leckie: The Curse of Ease of Access to the Internet. ICISS 2007: 234-249
29EEAbdun Naser Mahmood, Christopher Leckie, Parampalli Udaya: A scalable sampling scheme for clustering in network traffic analysis. Infoscale 2007: 38
28EEChenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie: Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection. Integrated Network Management 2007: 80-89
27EETao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1): (2007)
26EETao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Information sharing for distributed intrusion detection systems. J. Network and Computer Applications 30(3): 877-899 (2007)
2006
25EEJames C. Bezdek, Richard J. Hathaway, Christopher Leckie, Kotagiri Ramamohanarao: Approximate data mining in very large relational data. ADC 2006: 3-13
24EEXiaoyuan Qian, James Bailey, Christopher Leckie: Mining Generalised Emerging Patterns. Australian Conference on Artificial Intelligence 2006: 295-304
23EEJeffrey Chan, James Bailey, Christopher Leckie: Discovering and Summarising Regions of Correlated Spatio-Temporal Change in Evolving Graphs. ICDM Workshops 2006: 361-365
22EEDana Zhang, Christopher Leckie: An evaluation technique for network intrusion detection systems. Infoscale 2006: 23
21EEAbdun Naser Mahmood, Christopher Leckie, Parampalli Udaya: Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis. Networking 2006: 1092-1098
20EEChong Eik Loo, Mun Yong Ng, Christopher Leckie, Marimuthu Palaniswami: Intrusion Detection for Routing Attacks in Sensor Networks. IJDSN 2(4): 313-332 (2006)
19EEJames C. Bezdek, Richard J. Hathaway, Jacalyn M. Huband, Christopher Leckie, Kotagiri Ramamohanarao: Approximate clustering in very large relational data. Int. J. Intell. Syst. 21(8): 817-841 (2006)
2005
18EEKingsly Leung, Christopher Leckie: Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. ACSC 2005: 333-342
17EEY. Al-Hammadi, Christopher Leckie: Anomaly detection for Internet worms. Integrated Network Management 2005: 133-146
16EETao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Exploiting Traffic Localities for Efficient Flow State Lookup. NETWORKING 2005: 1133-1145
2004
15EETao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. NETWORKING 2004: 771-782
14EEJoshua Oldmeadow, Siddarth Ravinutala, Christopher Leckie: Adaptive Clustering for Network Intrusion Detection. PAKDD 2004: 255-259
13EESiew Cheong Au, Christopher Leckie, Ajeet Parhar, Gerard Wong: Efficient visualization of large routing topologies. Int. Journal of Network Management 14(2): 105-118 (2004)
2003
12EETao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. ACISP 2003: 214-225
11EEChristopher Leckie, Kotagiri Ramamohanarao: Policies for Sharing Distributed Probabilistic Beliefs. ACSC 2003: 285-290
10 Herman L. Ferrá, Ken Lau, Christopher Leckie, Anderson Tang: Applying Reinforcement Learning to Packet Scheduling in Routers. IAAI 2003: 79-84
2002
9 Christopher Leckie, Kotagiri Ramamohanarao: Learning to Share Distributed Probabilistic Beliefs. ICML 2002: 371-378
8EETao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Adjusted Probabilistic Packet Marking for IP Traceback. NETWORKING 2002: 697-708
7EEChristopher Leckie, Kotagiri Ramamohanarao: A probabilistic approach to detecting network scans. NOMS 2002: 359-372
1999
6 Bhavani Raskutti, Christopher Leckie: An Evaluation of Criteria for Measuring the Quality of Clusters. IJCAI 1999: 905-910
1998
5EEChristopher Leckie, Ingrid Zukerman: Inductive Learning of Search Control Rules for Planning. Artif. Intell. 101(1-2): 63-98 (1998)
1997
4 Christopher Leckie, Michael Dale: Locating Faults in Tree-Structured Networks. IJCAI (1) 1997: 434-439
1996
3 Ming Zhao, Christopher Leckie: The Development of an Interactive Fault Diagnosis Expert System for Telecommunication Applications. PRICAI 1996: 59-70
1993
2 Christopher Leckie, Ingrid Zukerman: An Inductive Approach to Learning Search Control Rules for Planning. IJCAI 1993: 1100-1105
1991
1 Christopher Leckie, Ingrid Zukerman: Learning Search Control Rules for Planning: An Inductive Approach. ML 1991: 422-426

Coauthor Index

1Y. Al-Hammadi [17]
2Siew Cheong Au [13]
3James Bailey [23] [24] [33]
4James C. Bezdek [19] [25] [31] [32] [34] [41] [45]
5Jeffrey Chan [23] [33]
6Joanna Cheng [40]
7Michael Dale [4]
8Daniel Peter Dallas [36]
9Herman L. Ferrá [10]
10Xin Geng [41] [43]
11Kapil Kumar Gupta [30]
12Richard J. Hathaway [19] [25]
13Jacalyn M. Huband [19]
14Shanika Karunasekera [28] [38] [44]
15Ken Lau [10]
16Kingsly Leung [18]
17Chong Eik Loo [20]
18Ming Luo [39]
19Abdun Naser Mahmood [21] [29] [35]
20Mun Yong Ng [20]
21Joshua Oldmeadow [14]
22Marimuthu Palaniswami [20] [32] [42]
23Ajeet Parhar [13]
24Tao Peng [8] [12] [15] [16] [26] [27] [30] [39]
25Xiaoyuan Qian [24]
26Sutharshan Rajasegarar [32] [42]
27Kotagiri Ramamohanarao [7] [8] [9] [11] [12] [15] [16] [19] [25] [26] [27] [30] [31] [34] [36] [37] [41] [43] [45]
28Bhavani Raskutti [6]
29Siddarth Ravinutala [14]
30Anderson Tang [10]
31Parampalli Udaya [21] [29] [35]
32Liang Wang [31] [34] [37] [40] [41] [43] [45]
33Xiaozhe Wang [31] [37]
34Gerard Wong [13]
35Dana Zhang [22]
36Ming Zhao [3]
37Chenfeng Vincent Zhou [28] [38] [44]
38Ingrid Zukerman [1] [2] [5]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)