Pavel Laskov

According to our database1, Pavel Laskov authored at least 61 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431).
Dagstuhl Reports, 2023

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples.
IEEE Trans. Netw. Serv. Manag., December, 2022

Security of Machine Learning (Dagstuhl Seminar 22281).
Dagstuhl Reports, July, 2022

The Role of Machine Learning in Cybersecurity.
CoRR, 2022

Towards Understanding the Skill Gap in Cybersecurity.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022

SoK: The Impact of Unlabelled Data in Cyberthreat Detection.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
Detection of illicit cryptomining using network metadata.
EURASIP J. Inf. Secur., 2021

2016
Hidost: a static machine-learning-based detector of malicious files.
EURASIP J. Inf. Secur., 2016

2014
Practical Evasion of a Learning-Based Classifier: A Case Study.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2013
Evasion Attacks against Machine Learning at Test Time.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Detection of Malicious PDF Files Based on Hierarchical Document Structure.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Security analysis of online centroid anomaly detection.
J. Mach. Learn. Res., 2012

Anomaly Detection at "supersonic" Speed.
it Inf. Technol., 2012

Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
Dagstuhl Reports, 2012

Poisoning Attacks against Support Vector Machines.
Proceedings of the 29th International Conference on Machine Learning, 2012

2011
Microbagging Estimators: An Ensemble Approach to Distance-weighted Classifiers.
Proceedings of the 3rd Asian Conference on Machine Learning, 2011

Support Vector Machines Under Adversarial Label Noise.
Proceedings of the 3rd Asian Conference on Machine Learning, 2011

Understanding the risk factors of learning in adversarial environments.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

Static detection of malicious JavaScript-bearing PDF documents.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Machine learning in adversarial environments.
Mach. Learn., 2010

Online Anomaly Detection under Adversarial Impact.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

A factorization method for the classification of infrared spectra.
BMC Bioinform., 2010

Botzilla: detecting the "phoning home" of malicious software.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

TokDoc: a self-healing web application firewall.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

FPGA vs. Multi-core CPUs vs. GPUs: Hands-On Experience with a Sorting Application.
Proceedings of the Facing the Multicore-Challenge, 2010

2009
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008.
Comput. Sci. Res. Dev., 2009

Securing IMS against novel threats.
Bell Labs Tech. J., 2009

Efficient and Accurate Lp-Norm Multiple Kernel Learning.
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009

CLIO - A Cross-Layer Information Service for Overlay Network Optimization.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

Sicherer Umgang mit sensiblen Daten - technische Prävention und Reaktionen auf Datenschutzverletzungen.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection.
Proceedings of the Critical Information Infrastructures Security, 2009

A framework for quantitative security analysis of machine learning.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

2008
Linear-Time Computation of Similarity Measures for Sequential Data.
J. Mach. Learn. Res., 2008

A Self-learning System for Detection of Anomalous SIP Messages.
Proceedings of the Principles, 2008

Stopping conditions for exact computation of leave-one-out error in support vector machines.
Proceedings of the Machine Learning, 2008

Incorporation of Application Layer Protocol Syntax into Anomaly Detection.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Learning and Classification of Malware Behavior.
Proceedings of the Detection of Intrusions and Malware, 2008

08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

Automatic feature selection for anomaly detection.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

2007
Language models for detection of unknown attacks in network traffic.
J. Comput. Virol., 2007

Foreword.
J. Comput. Virol., 2007

Machine Learning for Intrusion Detection.
Proceedings of the Mining Massive Data Sets for Security, 2007

2006
Incremental Support Vector Learning: Analysis, Implementation and Applications.
J. Mach. Learn. Res., 2006

Computation of Similarity Measures for Sequential Data using Generalized Suffix Trees.
Proceedings of the Advances in Neural Information Processing Systems 19, 2006

Detecting Unknown Network Attacks Using Language Models.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

Efficient Algorithms for Similarity Measures over Sequential Data: A Look Beyond Kernels.
Proceedings of the Pattern Recognition, 2006

2005
Visualization of anomaly detection using prediction sensitivity.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Learning Intrusion Detection: Supervised or Unsupervised?.
Proceedings of the Image Analysis and Processing, 2005

2004
Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines.
Prax. Inf.verarb. Kommun., 2004

A Fast Algorithm for Joint Diagonalization with Non-orthogonal Transformations and its Application to Blind Source Separation.
J. Mach. Learn. Res., 2004

Using classification to determine the number of finger strokes on a multi-touch tactile device.
Proceedings of the 12th European Symposium on Artificial Neural Networks, 2004

Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

2003
Curvature-Based Algorithms for Nonrigid Motion and Correspondence Estimation.
IEEE Trans. Pattern Anal. Mach. Intell., 2003

3D nonrigid motion analysis under small deformations.
Image Vis. Comput., 2003

Online SVM learning: from classification to data description and back.
Proceedings of the NNSP 2003, 2003

2002
Feasible Direction Decomposition Algorithms for Training Support Vector Machines.
Mach. Learn., 2002

2001
Comparison of 3D Algorithms for Non-rigid Motion and Correspondence Estimation.
Proceedings of the British Machine Vision Conference 2001, 2001

1999
An Improved Decomposition Algorithm for Regression Support Vector Machines.
Proceedings of the Advances in Neural Information Processing Systems 12, [NIPS Conference, Denver, Colorado, USA, November 29, 1999

Distributed Output Encoding for Multi-Class Pattern Recognition.
Proceedings of the 1oth International Conference on Image Analysis and Processing (ICIAP 1999), 1999

1996
Recognition approach to gesture language understanding.
Proceedings of the 13th International Conference on Pattern Recognition, 1996


  Loading...