Current Research Information SysTem In Norway

 English version

Logg inn
Om Cristin
Eksporter til

Viser treff 1-8 av 8

1 Chitrakar, Ambika Shrestha; Petrovic, Slobodan.
Efficient k-means Using Triangle Inequality on Spark for Cyber Security Analytics. I: IWSPA '19 Proceedings of the ACM International Workshop on Security and Privacy Analytics. Association for Computing Machinery (ACM) 2019 ISBN 978-1-4503-6178-1. s. 37-45
NTNU Untitled
2 Chitrakar, Ambika Shrestha; Petrovic, Slobodan.
Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark. I: 2018 IEEE International Conference on Big Data (Big Data), Seattle, 10-13 Dec. 2018. IEEE 2018 ISBN 978-1-5386-5035-6. s. 3049-3058
NTNU Untitled
3 Chitrakar, Ambika Shrestha; Petrovic, Slobodan.
Collecting Network Evidence Using Constrained Approximate Search Algorithms. IFIP Advances in Information and Communication Technology 2018 ;Volum 532. s. 141-160
NTNU Untitled
4 Chitrakar, Ambika Shrestha; Petrovic, Slobodan.
Parallel k means clustering with triangle inequality on Spark. Swedish Data Science Workshop (SweDS); 2018-11-20 - 2018-11-21
NTNU Untitled
5 Chitrakar, Ambika Shrestha; Petrovic, Slobodan.
CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns. I: Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Springer 2017 ISBN 978-3-319-72816-2. s. 163-176
NTNU Untitled
6 Chitrakar, Ambika Shrestha; Petrovic, Slobodan.
Constrained Row-Based Bit-Parallel Search in Intrusion Detection. Norsk Informasjonssikkerhetskonferanse (NISK) 2016 s. 68-79
NTNU Untitled
7 Chitrakar, Ambika Shrestha; Petrovic, Slobodan.
Approximate search with constraints on indels with application in SPAM filtering. Norsk Informasjonssikkerhetskonferanse (NISK) 2015 s. 22-33
NTNU Untitled
8 Chitrakar, Ambika Shrestha; Franke, Katrin.
Author Identification from Text-based Communications: Identifying generalized features and computational methods. I: Proceeding of Norwegian Information Security Conference / Norsk informasjonssikkerhetskonferanse - NISK 2013 - Stavanger, 18th-20th November 2013. Akademika forlag 2013 ISBN 978-82-321-0366-9. s. 37-48
NTNU Untitled