Ranking on graph data, Proceedings of the 23rd international conference on Machine learning , ICML '06, pp.25-32, 2006. ,
DOI : 10.1145/1143844.1143848
A game theoretic analysis of intrusion detection in access control systems, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601), pp.1568-1573, 2004. ,
DOI : 10.1109/CDC.2004.1430267
The base-rate fallacy and its implications for the difficulty of intrusion detection, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.1-7, 1999. ,
DOI : 10.1145/319709.319710
An optimal control approach to malware filtering, 2007 46th IEEE Conference on Decision and Control, 2007. ,
DOI : 10.1109/CDC.2007.4434520
Malware Filtering for Network Security Using Weighted Optimality Measures, 2007 IEEE 22nd International Symposium on Intelligent Control, 2007. ,
DOI : 10.1109/ISIC.2007.4359596
Decentralized Detector Generation in Cooperative Intrusion Detection Systems, 9th Int. Symp. on Stabilization, Safety, and Security of Distributed Systems (SSS'07), 2007. ,
DOI : 10.1007/978-3-540-76627-8_6
SmartSiren, Proceedings of the 5th international conference on Mobile systems, applications and services , MobiSys '07, pp.258-271, 2007. ,
DOI : 10.1145/1247660.1247690
Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.32-46, 2005. ,
DOI : 10.1109/SP.2005.20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3399
The future of mobile malware, Network Security, vol.2007, issue.8, pp.7-11, 2007. ,
DOI : 10.1016/S1353-4858(07)70072-7
Histograms of Oriented Gradients for Human Detection, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05), pp.886-893, 2005. ,
DOI : 10.1109/CVPR.2005.177
URL : https://hal.archives-ouvertes.fr/inria-00548512
Reality mining: sensing complex social systems, Personal and Ubiquitous Computing, vol.10, issue.2, pp.255-268, 2006. ,
DOI : 10.1007/s00779-005-0046-3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.9752
Random-Walk Computation of Similarities between Nodes of a Graph with Application to Collaborative Recommendation, IEEE Transactions on Knowledge and Data Engineering, vol.19, issue.3, pp.355-369, 2007. ,
DOI : 10.1109/TKDE.2007.46
Star-Structured Higher-Order Heterogeneous Data Co- Clustering Based on Consistent Information Theory, Proc. ICDM, pp.880-884, 2006. ,
A Survey of Malware Detection Techniques, 2007. ,
Kernels for graphs, Kernel Methods in Computational Biology, pp.155-170, 2004. ,
Diffusion Kernels on Graphs and Other Discrete Input Spaces, Proc. ICML, pp.315-322, 2002. ,
A Survey of Eigenvector Methods for Web Information Retrieval, SIAM Review, vol.47, issue.1, pp.135-161, 2005. ,
DOI : 10.1137/S0036144503424786
A Cooperative AIS Framework for Intrusion Detection, 2007 IEEE International Conference on Communications, pp.1409-1416, 2007. ,
DOI : 10.1109/ICC.2007.237
Machine Learning and Data Mining for Computer Security, 2006. ,
DOI : 10.1007/1-84628-253-5
New approaches to malware detection coming into view. Net- work World, 2007. ,
Host-Based Intrusion Detection for Advanced Mobile Devices, 20th International Conference on Advanced Information Networking and Applications, Volume 1 (AINA'06), pp.72-76, 2006. ,
DOI : 10.1109/AINA.2006.192
Introduction to Modern Information Retrieval, 1983. ,
Monitoring smartphones for anomaly detection, Proc. of First Int. Conf. on Mobile Wireless Middleware, Operating Systems, and Applications, 2008. ,
A Malware Detector Placement Game for Intrusion Detection, 2nd International Workshop on Critical Information Infrastructures Security (CRITIS'07). Malaga, Spain, 2007. ,
DOI : 10.1007/978-3-540-89173-4_26
Anomalous Payload-Based Network Intrusion Detection, Proc. Int. Symp. on Recent Advances in Intrusion Detection, pp.203-222, 2004. ,
DOI : 10.1007/978-3-540-30143-1_11
Factor-analysis based anomaly detection and clustering, Decision Support Systems, vol.42, issue.1, pp.375-389, 2006. ,
DOI : 10.1016/j.dss.2005.01.005
A Mobile Phone Malicious Software Detection Model with Behavior Checker, Lecture Notes in Computer Science, vol.3597, pp.57-65, 2005. ,
DOI : 10.1007/11527725_7
Ranking on Data Manifolds, Proc. NIPS, pp.169-176, 2004. ,