High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning SM Erfani, S Rajasegarar, S Karunasekera, C Leckie Pattern Recognition 58, 121-134, 2016 | 1223 | 2016 |
Survey of network-based defense mechanisms countering the DoS and DDoS problems T Peng, C Leckie, K Ramamohanarao ACM Computing Surveys (CSUR) 39 (1), 3-es, 2007 | 1103 | 2007 |
Fuzzy c-means algorithms for very large data TC Havens, JC Bezdek, C Leckie, LO Hall, M Palaniswami IEEE Transactions on Fuzzy Systems 20 (6), 1130-1146, 2012 | 590 | 2012 |
Unsupervised anomaly detection in network intrusion detection using clusters K Leung, C Leckie Proceedings of the Twenty-eighth Australasian conference on Computer Science …, 2005 | 566 | 2005 |
A survey of coordinated attacks and collaborative intrusion detection CV Zhou, C Leckie, S Karunasekera computers & security 29 (1), 124-140, 2010 | 521 | 2010 |
Protection from distributed denial of service attacks using history-based IP filtering T Peng, C Leckie, K Ramamohanarao IEEE International Conference on Communications, 2003. ICC'03. 1, 482-486, 2003 | 427 | 2003 |
Anomaly detection in wireless sensor networks S Rajasegarar, C Leckie, M Palaniswami IEEE Wireless Communications 15 (4), 34-40, 2008 | 382 | 2008 |
Distributed anomaly detection in wireless sensor networks S Rajasegarar, C Leckie, M Palaniswami, JC Bezdek 2006 10th IEEE Singapore international conference on communication systems, 1-5, 2006 | 369 | 2006 |
Intrusion detection for routing attacks in sensor networks CE Loo, MY Ng, C Leckie, M Palaniswami International Journal of Distributed Sensor Networks 2 (4), 313-332, 2006 | 329 | 2006 |
Parking availability prediction for sensor-enabled car parks in smart cities Y Zheng, S Rajasegarar, C Leckie 2015 IEEE tenth international conference on intelligent sensors, sensor …, 2015 | 308 | 2015 |
Proactively detecting distributed denial of service attacks using source IP address monitoring T Peng, C Leckie, K Ramamohanarao Networking 2004: Networking Technologies, Services, and Protocols …, 2004 | 274 | 2004 |
Quarter sphere based distributed anomaly detection in wireless sensor networks S Rajasegarar, C Leckie, M Palaniswami, JC Bezdek 2007 IEEE International Conference on Communications, 3864-3869, 2007 | 258 | 2007 |
Using virtual machine allocation policies to defend against co-resident attacks in cloud computing Y Han, J Chan, T Alpcan, C Leckie IEEE Transactions on Dependable and Secure Computing 14 (1), 95-108, 2015 | 228 | 2015 |
Personalized tour recommendation based on user interests and points of interest visit durations KH Lim, J Chan, C Leckie, S Karunasekera Twenty-Fourth International Joint Conference on Artificial Intelligence …, 2015 | 211 | 2015 |
Personalized trip recommendation for tourists based on user interests, points of interest visit durations and visit recency KH Lim, J Chan, C Leckie, S Karunasekera Knowledge and Information Systems 54, 375-406, 2018 | 195 | 2018 |
Fast memory efficient local outlier detection in data streams M Salehi, C Leckie, JC Bezdek, T Vaithianathan, X Zhang IEEE Transactions on Knowledge and Data Engineering 28 (12), 3246-3260, 2016 | 189 | 2016 |
Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks S Rajasegarar, C Leckie, JC Bezdek, M Palaniswami IEEE Transactions on Information Forensics and Security 5 (3), 518-533, 2010 | 187 | 2010 |
Adjusted probabilistic packet marking for IP traceback T Peng, C Leckie, K Ramamohanarao NETWORKING 2002: Networking Technologies, Services, and Protocols …, 2002 | 166 | 2002 |
Labelled data collection for anomaly detection in wireless sensor networks S Suthaharan, M Alzahrani, S Rajasegarar, C Leckie, M Palaniswami 2010 sixth international conference on intelligent sensors, sensor networks …, 2010 | 162 | 2010 |
Tour recommendation and trip planning using location-based social media: A survey KH Lim, J Chan, S Karunasekera, C Leckie Knowledge and Information Systems 60, 1247-1275, 2019 | 140 | 2019 |