![]() |
| 2004 | ||
|---|---|---|
| 4 | EE | Matthias Schonlau, Ronald D. Fricker Jr., Marc N. Elliott: Conducting research surveys via e-mail and the Web. Inf. Res. 9(3): (2004) |
| 2000 | ||
| 3 | EE | Nandini Raghavan, Robert M. Bell, Matthias Schonlau: Defection detection: using activity profiles to predict ISP customer vulnerability. KDD 2000: 506-515 |
| 2 | EE | Matthias Schonlau, Martin Theus: Detecting masquerades in intrusion detection based on unpopular commands. Inf. Process. Lett. 76(1-2): 33-38 (2000) |
| 1998 | ||
| 1 | William DuMouchel, Matthias Schonlau: A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities. KDD 1998: 189-193 | |
| 1 | Robert M. Bell | [3] |
| 2 | William DuMouchel | [1] |
| 3 | Marc N. Elliott | [4] |
| 4 | Ronald D. Fricker Jr. | [4] |
| 5 | Nandini Raghavan | [3] |
| 6 | Martin Theus | [2] |