Cited By
View all- Bhat WQuadri SSadeghi AGligor VYung M(2013)POSTER: Dr. Watson provides data for post-breach analysisProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2512522(1445-1448)Online publication date: 4-Nov-2013
- Muntean MVălean HBurdescu DAkerkar RBădică C(2012)Wrappers for web access logs feature selectionProceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics10.1145/2254129.2254156(1-7)Online publication date: 13-Jun-2012