2009 | ||
---|---|---|
45 | EE | Liang Wang, Christopher Leckie, Kotagiri Ramamohanarao, James C. Bezdek: Approximate Spectral Clustering. PAKDD 2009: 134-146 |
44 | EE | Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera: Collaborative Detection of Fast Flux Phishing Domains. JNW 4(1): 75-84 (2009) |
2008 | ||
43 | EE | Liang Wang, Xin Geng, Christopher Leckie, Kotagiri Ramamohanarao: Moving shape dynamics: A signal processing perspective. CVPR 2008 |
42 | EE | Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami: CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection. ICC 2008: 1610-1614 |
41 | EE | Liang Wang, Xin Geng, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao: SpecVAT: Enhanced Visual Cluster Analysis. ICDM 2008: 638-647 |
40 | EE | Joanna Cheng, Liang Wang, Christopher Leckie: Dual clustering for categorization of action sequences. ICPR 2008: 1-4 |
39 | EE | Ming Luo, Tao Peng, Christopher Leckie: CPU-based DoS attacks against SIP servers. NOMS 2008: 41-48 |
38 | EE | Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie: Relieving hot spots in collaborative intrusion detection systems during worm outbreaks. NOMS 2008: 49-56 |
37 | EE | Liang Wang, Xiaozhe Wang, Christopher Leckie, Kotagiri Ramamohanarao: Characteristic-Based Descriptors for Motion Sequence Recognition. PAKDD 2008: 369-380 |
36 | EE | Daniel Peter Dallas, Christopher Leckie, Kotagiri Ramamohanarao: Analysis and enhancement of on-demand routing in wireless sensor networks. PM2HW2N 2008: 173-179 |
35 | EE | Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya: An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis. IEEE Trans. Knowl. Data Eng. 20(6): 752-767 (2008) |
34 | EE | Liang Wang, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao: Selective sampling for approximate clustering of very large data sets. Int. J. Intell. Syst. 23(3): 313-331 (2008) |
33 | EE | Jeffrey Chan, James Bailey, Christopher Leckie: Discovering correlated spatio-temporal changes in evolving graphs. Knowl. Inf. Syst. 16(1): 53-96 (2008) |
2007 | ||
32 | EE | Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami, James C. Bezdek: Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks. ICC 2007: 3864-3869 |
31 | EE | Liang Wang, Christopher Leckie, Xiaozhe Wang, Kotagiri Ramamohanarao, James C. Bezdek: Tensor Space Learning for Analyzing Activity Patterns from Video Sequences. ICDM Workshops 2007: 63-68 |
30 | EE | Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, Christopher Leckie: The Curse of Ease of Access to the Internet. ICISS 2007: 234-249 |
29 | EE | Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya: A scalable sampling scheme for clustering in network traffic analysis. Infoscale 2007: 38 |
28 | EE | Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie: Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection. Integrated Network Management 2007: 80-89 |
27 | EE | Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1): (2007) |
26 | EE | Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Information sharing for distributed intrusion detection systems. J. Network and Computer Applications 30(3): 877-899 (2007) |
2006 | ||
25 | EE | James C. Bezdek, Richard J. Hathaway, Christopher Leckie, Kotagiri Ramamohanarao: Approximate data mining in very large relational data. ADC 2006: 3-13 |
24 | EE | Xiaoyuan Qian, James Bailey, Christopher Leckie: Mining Generalised Emerging Patterns. Australian Conference on Artificial Intelligence 2006: 295-304 |
23 | EE | Jeffrey Chan, James Bailey, Christopher Leckie: Discovering and Summarising Regions of Correlated Spatio-Temporal Change in Evolving Graphs. ICDM Workshops 2006: 361-365 |
22 | EE | Dana Zhang, Christopher Leckie: An evaluation technique for network intrusion detection systems. Infoscale 2006: 23 |
21 | EE | Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya: Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis. Networking 2006: 1092-1098 |
20 | EE | Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Marimuthu Palaniswami: Intrusion Detection for Routing Attacks in Sensor Networks. IJDSN 2(4): 313-332 (2006) |
19 | EE | James C. Bezdek, Richard J. Hathaway, Jacalyn M. Huband, Christopher Leckie, Kotagiri Ramamohanarao: Approximate clustering in very large relational data. Int. J. Intell. Syst. 21(8): 817-841 (2006) |
2005 | ||
18 | EE | Kingsly Leung, Christopher Leckie: Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. ACSC 2005: 333-342 |
17 | EE | Y. Al-Hammadi, Christopher Leckie: Anomaly detection for Internet worms. Integrated Network Management 2005: 133-146 |
16 | EE | Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Exploiting Traffic Localities for Efficient Flow State Lookup. NETWORKING 2005: 1133-1145 |
2004 | ||
15 | EE | Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. NETWORKING 2004: 771-782 |
14 | EE | Joshua Oldmeadow, Siddarth Ravinutala, Christopher Leckie: Adaptive Clustering for Network Intrusion Detection. PAKDD 2004: 255-259 |
13 | EE | Siew Cheong Au, Christopher Leckie, Ajeet Parhar, Gerard Wong: Efficient visualization of large routing topologies. Int. Journal of Network Management 14(2): 105-118 (2004) |
2003 | ||
12 | EE | Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. ACISP 2003: 214-225 |
11 | EE | Christopher Leckie, Kotagiri Ramamohanarao: Policies for Sharing Distributed Probabilistic Beliefs. ACSC 2003: 285-290 |
10 | Herman L. Ferrá, Ken Lau, Christopher Leckie, Anderson Tang: Applying Reinforcement Learning to Packet Scheduling in Routers. IAAI 2003: 79-84 | |
2002 | ||
9 | Christopher Leckie, Kotagiri Ramamohanarao: Learning to Share Distributed Probabilistic Beliefs. ICML 2002: 371-378 | |
8 | EE | Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao: Adjusted Probabilistic Packet Marking for IP Traceback. NETWORKING 2002: 697-708 |
7 | EE | Christopher Leckie, Kotagiri Ramamohanarao: A probabilistic approach to detecting network scans. NOMS 2002: 359-372 |
1999 | ||
6 | Bhavani Raskutti, Christopher Leckie: An Evaluation of Criteria for Measuring the Quality of Clusters. IJCAI 1999: 905-910 | |
1998 | ||
5 | EE | Christopher Leckie, Ingrid Zukerman: Inductive Learning of Search Control Rules for Planning. Artif. Intell. 101(1-2): 63-98 (1998) |
1997 | ||
4 | Christopher Leckie, Michael Dale: Locating Faults in Tree-Structured Networks. IJCAI (1) 1997: 434-439 | |
1996 | ||
3 | Ming Zhao, Christopher Leckie: The Development of an Interactive Fault Diagnosis Expert System for Telecommunication Applications. PRICAI 1996: 59-70 | |
1993 | ||
2 | Christopher Leckie, Ingrid Zukerman: An Inductive Approach to Learning Search Control Rules for Planning. IJCAI 1993: 1100-1105 | |
1991 | ||
1 | Christopher Leckie, Ingrid Zukerman: Learning Search Control Rules for Planning: An Inductive Approach. ML 1991: 422-426 |