, Towards Differentiating Business Intelligence, Big Data, Data Analytics and Knowledge Discovery, 2017.
Lambda architecture for cost-effective batch and speed big data processing, IEEE International Conference on Big Data (Big Data), pp.2785-2792, 2015. ,
The Lambda and the Kappa, IEEE Internet Computing, vol.21, pp.60-66, 2017. ,
A Hybrid Network Anomaly and Intrusion Detection Approach Based on Evolving Spiking Neural Network Classification. e-Democracy, Communications in Computer and Information Science, vol.441, pp.11-23, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-02155919
Online ensemble learning with abstaining classifiers for drifting and noisy data streams, Applied Soft Computing Journal Article in Press, 2018. ,
, Asynchronous multi-task learning ICDM, pp.11-20, 2016.
Parallel multi-task learning, ICDM, pp.629-638, 2015. ,
A model-based approach to self-protection in computing system, Proceeding CAC '13 Proc of the ACM Cloud and Autonomic Computing Conference, 2013. ,
, Yannis Soupionis, Stavros Ntalampiras and Georgios Giannopoulos, vol.8985, 2016.
Detecting node replication attacks in wireless sensor networks: a survey, Journal of Network and Computer Applications, vol.35, pp.1022-1034, 2012. ,
Improving Cyber-Security Awareness on Industrial Control Systems: The CockpitCI Approach, Journal of Information Warfare -ISSN 1445, vol.3347, issue.4, 2015. ,
A convex formulation for learning task relationships in multi-task learning, UAI, pp.733-442, 2010. ,
Distributed multi-task learning, AISTATS, pp.751-760, 2016. ,
, Strategies and Principles of Distributed Machine Learning on Big Data. Engineering, vol.2, pp.179-195, 2016.
Linear algorithms for online multitask classification, COLT'08, 2008. ,
MOLESTRA: A Multi-Task Learning Approach for Real-Time Big Data Analytics, 2018 Innovations in Intelligent Systems and Applications (INISTA), pp.1-8, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02155891
A Spiking One-Class Anomaly Detection Framework for Cyber-Security on Industrial Control Systems, Communications in Computer and Information Science, vol.744, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-02155903
An innovative soft computing system for smart energy grids cybersecurity, Advances in Building Energy Research, vol.12, issue.1, pp.3-24, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02155876
A Computational Intelligence System Identifying Cyber-Attacks on Smart Energy Grids, Modern Discrete Mathematics and Analysis. Springer Optimization and Its Applications, vol.131, 2018. ,
The Next Generation Cognitive Security Operations Center, Network Flow Forensics Using Cybersecurity Intelligence. Big Data Cogn. Comput, vol.2, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02157103
The Next Generation Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for Efficient Defense against Adversarial Attacks, Big Data Cogn. Comput, vol.3, p.6, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02157104
, Series: Cybercrime and Cybersecurity Research, NOVA science publishers
Extreme learning machine: theory and applications, Neurocomputing, vol.70, issue.1-3, pp.489-501, 2006. ,
Optimal single-class classification strategies -google scholar, Proc. of the 2006 NIPS Conference, vol.19, pp.377-384, 2007. ,
Multi-class and single-class classification approaches to vehicle model recognition from images, Proc. of Artificial Intelligence and Cognitive Science, 2005. ,
An overview on Restricted Boltzmann Machines, Neurocomputing, vol.275, pp.1186-1199, 2018. ,
Convergence Analysis of Contrastive Divergence Algorithm Based on Gradient Method with Errors, 2015. ,
Machine Learning for Sequential Data: A Review, Structural, Syntactic, and Statistical Pattern Recognition. SSPR /SPR, 2002. ,
Industrial Control System Simulation and Data Logging for Intrusion Detection System Research, International Journal of Network Security (IJNS), vol.17, issue.2, pp.174-188, 2015. ,
, CRC Standard Probability and Statistics Tables and Formulae, 2000.
An introduction to ROC analysis, Pattern Recognition Letters, vol.27, issue.8, pp.861-874, 2006. ,
A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02155884
SAME: An Intelligent Anti-malware Extension for Android ART Virtual Machine, Computational Collective Intelligence, vol.9330, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02155913
Evolving Smart URL Filter in a Zone-Based Policy Firewall for Detecting Algorithmically Generated Malicious Domains, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02155914
, Statistical Learning and Data Sciences. SLDS, vol.9047, 2015.