Thomas Stibor

According to our database1, Thomas Stibor authored at least 22 papers between 2004 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Evasion Attack of Multi-class Linear Classifiers.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2012

2010
Efficient Collapsed Gibbs Sampling for Latent Dirichlet Allocation.
Proceedings of the 2nd Asian Conference on Machine Learning, 2010

A Study of Detecting Computer Viruses in Real-Infected Files in the <i>n</i>-Gram Representation with Machine Learning Methods.
Proceedings of the Trends in Applied Intelligent Systems, 2010

On Immunological Memory as a Function of a Recursive Proliferation Process.
Proceedings of the 15th IEEE International Conference on Engineering of Complex Computer Systems, 2010

2009
Foundations of <i>r</i>-contiguous matching in negative selection for anomaly detection.
Nat. Comput., 2009

Geometrical insights into the dendritic cell algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

2008
Theoretical advances in artificial immune systems.
Theor. Comput. Sci., 2008

An Empirical Study of Self/Non-self Discrimination in Binary Data with a Kernel Estimator.
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008

Discriminating self from non-self with finite mixtures of multivariate Bernoulli distributions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

2007
Phase Transition and the Computational Complexity of Generating <i>r</i> -Contiguous Detectors.
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007

An Investigation on the Compression Quality of aiNet.
Proceedings of the IEEE Symposium on Foundations of Computational Intelligence, 2007

Comments on real-valued negative selection vs. real-valued positive selection and one-class SVM.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
On the appropriateness of negative selection for anomaly detection and network intrusion detection.
PhD thesis, 2006

Artificial Immune Systems for IT-Security (Künstliche Immunsysteme für IT-Sicherheit).
it Inf. Technol., 2006

Generalization Regions in Hamming Negative Selection.
Proceedings of the Intelligent Information Processing and Web Mining, 2006

On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

On Permutation Masks in Hamming Negative Selection.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

The Link between r-contiguous Detectors and k-CNF Satisfiability.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques.
Proceedings of the Artificial Immune Systems: 4th International Conference, 2005

Is negative selection appropriate for anomaly detection?
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system.
Proceedings of the IEEE Congress on Evolutionary Computation, 2005

2004
An Investigation of R-Chunk Detector Generation on Higher Alphabets.
Proceedings of the Genetic and Evolutionary Computation, 2004


  Loading...