Suivre
Christopher Leckie
Christopher Leckie
Professor, Computing and Information Systems, The University of Melbourne
Adresse e-mail validée de unimelb.edu.au
Titre
Citée par
Citée par
Année
High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning
SM Erfani, S Rajasegarar, S Karunasekera, C Leckie
Pattern Recognition 58, 121-134, 2016
11812016
Survey of network-based defense mechanisms countering the DoS and DDoS problems
T Peng, C Leckie, K Ramamohanarao
ACM Computing Surveys (CSUR) 39 (1), 3-es, 2007
10832007
Fuzzy c-means algorithms for very large data
TC Havens, JC Bezdek, C Leckie, LO Hall, M Palaniswami
IEEE Transactions on Fuzzy Systems 20 (6), 1130-1146, 2012
5832012
Unsupervised anomaly detection in network intrusion detection using clusters
K Leung, C Leckie
Proceedings of the Twenty-eighth Australasian conference on Computer Science …, 2005
5572005
A survey of coordinated attacks and collaborative intrusion detection
CV Zhou, C Leckie, S Karunasekera
computers & security 29 (1), 124-140, 2010
5152010
Protection from distributed denial of service attacks using history-based IP filtering
T Peng, C Leckie, K Ramamohanarao
IEEE International Conference on Communications, 2003. ICC'03. 1, 482-486, 2003
4232003
Anomaly detection in wireless sensor networks
S Rajasegarar, C Leckie, M Palaniswami
IEEE Wireless Communications 15 (4), 34-40, 2008
3762008
Distributed anomaly detection in wireless sensor networks
S Rajasegarar, C Leckie, M Palaniswami, JC Bezdek
2006 10th IEEE Singapore international conference on communication systems, 1-5, 2006
3662006
Intrusion detection for routing attacks in sensor networks
CE Loo, MY Ng, C Leckie, M Palaniswami
International Journal of Distributed Sensor Networks 2 (4), 313-332, 2006
3272006
Parking availability prediction for sensor-enabled car parks in smart cities
Y Zheng, S Rajasegarar, C Leckie
2015 IEEE tenth international conference on intelligent sensors, sensor …, 2015
3012015
Proactively detecting distributed denial of service attacks using source IP address monitoring
T Peng, C Leckie, K Ramamohanarao
Networking 2004: Networking Technologies, Services, and Protocols …, 2004
2732004
Quarter sphere based distributed anomaly detection in wireless sensor networks
S Rajasegarar, C Leckie, M Palaniswami, JC Bezdek
2007 IEEE International Conference on Communications, 3864-3869, 2007
2542007
Using virtual machine allocation policies to defend against co-resident attacks in cloud computing
Y Han, J Chan, T Alpcan, C Leckie
IEEE Transactions on Dependable and Secure Computing 14 (1), 95-108, 2015
2212015
Personalized tour recommendation based on user interests and points of interest visit durations
KH Lim, J Chan, C Leckie, S Karunasekera
Twenty-Fourth International Joint Conference on Artificial Intelligence …, 2015
2052015
Personalized trip recommendation for tourists based on user interests, points of interest visit durations and visit recency
KH Lim, J Chan, C Leckie, S Karunasekera
Knowledge and Information Systems 54, 375-406, 2018
1882018
Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks
S Rajasegarar, C Leckie, JC Bezdek, M Palaniswami
IEEE Transactions on Information Forensics and Security 5 (3), 518-533, 2010
1842010
Fast memory efficient local outlier detection in data streams
M Salehi, C Leckie, JC Bezdek, T Vaithianathan, X Zhang
IEEE Transactions on Knowledge and Data Engineering 28 (12), 3246-3260, 2016
1812016
Adjusted probabilistic packet marking for IP traceback
T Peng, C Leckie, K Ramamohanarao
NETWORKING 2002: Networking Technologies, Services, and Protocols …, 2002
1662002
Labelled data collection for anomaly detection in wireless sensor networks
S Suthaharan, M Alzahrani, S Rajasegarar, C Leckie, M Palaniswami
2010 sixth international conference on intelligent sensors, sensor networks …, 2010
1592010
A probabilistic approach to detecting network scans
C Leckie, R Kotagiri
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
1382002
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20