Temporal sequence learning and data reduction for anomaly detection T Lane, CE Brodley ACM Transactions on Information and System Security (TISSEC) 2 (3), 295-331, 1999 | 737 | 1999 |
An application of machine learning to anomaly detection T Lane, CE Brodley Proceedings of the 20th National Information Systems Security Conference 377 …, 1997 | 290 | 1997 |
Approximation algorithms for orienteering and discounted-reward TSP A Blum, S Chawla, DR Karger, T Lane, A Meyerson, M Minkoff SIAM Journal on Computing 37 (2), 653-670, 2007 | 289 | 2007 |
A computational study of off-target effects of RNA interference S Qiu, CM Adema, T Lane Nucleic acids research 33 (6), 1834-1847, 2005 | 283 | 2005 |
Sequence matching and learning in anomaly detection for computer security T Lane, CE Brodley AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, 43-49, 1997 | 275 | 1997 |
TDCS guided using fMRI significantly accelerates learning to identify concealed objects VP Clark, BA Coffman, AR Mayer, MP Weisend, TDR Lane, VD Calhoun, ... Neuroimage 59 (1), 117-128, 2012 | 248 | 2012 |
Graph-based malware detection using dynamic analysis B Anderson, D Quist, J Neil, C Storlie, T Lane Journal in computer Virology 7 (4), 247-258, 2011 | 247 | 2011 |
Machine learning techniques for the computer security domain of anomaly detection. TD Lane | 210 | 2002 |
Approaches to Online Learning and Concept Drift for User Identification in Computer Security. T Lane, CE Brodley KDD, 259-263, 1998 | 161 | 1998 |
Improving malware classification: bridging the static/dynamic gap B Anderson, C Storlie, T Lane Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012 | 137 | 2012 |
Hidden markov models for human/computer interface modeling T Lane Proceedings of the IJCAI-99 Workshop on Learning about Users, 35-44, 1999 | 137 | 1999 |
A framework for multiple kernel support vector regression and its applications to siRNA efficacy prediction S Qiu, T Lane IEEE/ACM Transactions on Computational Biology and Bioinformatics 6 (2), 190-199, 2008 | 120 | 2008 |
An empirical study of two approaches to sequence learning for anomaly detection T Lane, CE Brodley Machine learning 51 (1), 73-107, 2003 | 107 | 2003 |
Integrating multiple data sources for malware classification BH Anderson, CB Storlie, T Lane US Patent 9,021,589, 2015 | 99 | 2015 |
Modeling transfer relationships between learning tasks for improved inductive transfer E Eaton, T Lane Joint European Conference on Machine Learning and Knowledge Discovery in …, 2008 | 92 | 2008 |
Exploiting amino acid composition for predicting protein-protein interactions S Roy, D Martinez, H Platero, T Lane, M Werner-Washburne PloS one 4 (11), e7813, 2009 | 70 | 2009 |
Knowledge discovery and data mining: Computers taught to discern patterns, detect anomalies and apply decision algorithms can help secure computer systems and find volcanoes on … CE Brodley, T Lane, TM Stough American Scientist 87 (1), 54-61, 1999 | 64 | 1999 |
Discrete dynamic Bayesian network analysis of fMRI data J Burge, T Lane, H Link, S Qiu, VP Clark Human brain mapping 30 (1), 122-137, 2009 | 63 | 2009 |
Hybrid ICA–Bayesian network approach reveals distinct effective connectivity differences in schizophrenia D Kim, J Burge, T Lane, GD Pearlson, KA Kiehl, VD Calhoun Neuroimage 42 (4), 1560-1568, 2008 | 57 | 2008 |
Detecting the abnormal: Machine learning in computer security T Lane, CE Brodley | 57 | 1997 |