Erik M. Ferragut

According to our database1, Erik M. Ferragut authored at least 18 papers between 2009 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
A multi-level anomaly detection algorithm for time-varying graph data with interactive visualization.
Soc. Netw. Anal. Min., 2016

HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Nonparametric Bayesian Modeling for Automated Database Schema Matching.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

Finite energy and bounded actuator attacks on cyber-physical systems.
Proceedings of the 14th European Control Conference, 2015

Developing an Ontology for Cyber Security Knowledge Graphs.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Multi-Level Anomaly Detection on Time-Varying Graph Data.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Multi-Level Anomaly Detection on Streaming Graph Data.
CoRR, 2014

Integration of external data sources with cyber security data warehouse.
Proceedings of the Cyber and Information Security Research Conference, 2014

Finite energy and bounded attacks on control system sensor signals.
Proceedings of the American Control Conference, 2014

2013
Addressing the challenges of anomaly detection for cyber physical energy grid systems.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
situ: Situational understanding and discovery for cyber attacks.
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

A New, Principled Approach to Anomaly Detection.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Randomized Sampling for Large Data Applications of SVM.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

2011
System log summarization via semi-Markov models of inter-arrival times.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Modeling cyber conflicts using an extended Petri Net formalism.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Automatic construction of anomaly detectors from graphical models.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Addressing the need for independence in the CSE model.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2009
A dynamic erasure code for multicasting live data.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009


  Loading...