Seguir
Gil David
Gil David
Dirección de correo verificada de jyu.fi - Página principal
Título
Citado por
Citado por
Año
SpectralCAT: categorical spectral clustering of numerical and nominal data
G David, A Averbuch
Pattern Recognition 45 (1), 416-433, 2012
612012
Anomaly detection in dynamically evolving data and systems
A Averbuch, RR Coifman, G David
US Patent 9,843,596, 2017
592017
Hierarchical data organization, clustering and denoising via localized diffusion folders
G David, A Averbuch
Applied and Computational Harmonic Analysis 33 (1), 1-23, 2012
512012
“Hot hand” on strike: Bowling data indicates correlation to recent past results, not causality
G Yaari, G David
PLoS One 7 (1), e30112, 2012
352012
Anomaly-based detection of SQL injection attacks
A Averbuch, A Shmueli, G David
US Patent 8,225,402, 2012
292012
Anomaly detection and classification via diffusion processes in hyper-networks
G David
Tel Aviv University, 2009
282009
Survey: Intrusion detection systems in encrypted traffic
T Kovanen, G David, T Hämäläinen
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2016
252016
Unsupervised network intrusion detection systems for zero-day fast-spreading attacks and botnets
PV Amoli, T Hamalainen, G David, M Zolotukhin, M Mirzamohammad
JDCTA (International Journal of Digital Content Technology and its …, 2016
232016
θ-Calderón-zygmund operators
R Coifman, G David, Y Meyer, S Semmes
Harmonic analysis and partial differential equations, 132-145, 1989
15*1989
Generating Evidence Based Interpretation of Hematology Screens Anomaly Characterization
G David, L Bernstein, R R Coifman
The Open Clinical Biochemistry Journal 4 (1), 2011
142011
Anomaly detection framework for tracing problems in radio networks
J Turkka, T Ristaniemi, G David, A Averbuch
Proc. to ICN 2011, 2011
122011
Distinguishing vertical brute force attacks from benign errors
I Plotnik, M Dolinsky, S Krigsman, TA Be'ery, G David, M Simakov
US Patent 10,148,639, 2018
102018
DNS tunneling detection techniques–classification, and theoretical comparison in case of a real APT campaign
V Nuojua, G David, T Hämäläinen
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2017
92017
Anomaly detection approach to keystroke dynamics based user authentication
E Ivannikova, G David, T Hämäläinen
2017 IEEE Symposium on Computers and Communications (ISCC), 885-889, 2017
92017
Coarse-grained localized diffusion
G Wolf, A Rotbart, G David, A Averbuch
Applied and Computational Harmonic Analysis 33 (3), 388-400, 2012
82012
Clustering and classification via localized diffusion folders
A Averbuch, RR Coifman, G David
US Patent 8,355,998, 2013
72013
Hierarchical clustering via localized diffusion folders
G David, A Averbuch, RR Coifman
2010 AAAI Fall Symposium Series, 2010
72010
Domain generation algorithm detection using machine learning methods
M Baruch, G David
Cyber security: power and technology, 133-161, 2018
62018
The automated malnutrition assessment
G David, LH Bernstein, RR Coifman
Nutrition 29 (1), 113-121, 2013
62013
The Yield Stress Anomaly in Fe-Al Alloys: The Role of the Local Climb Locking Mechanism
DG Morris, D Peguiron
MRS Online Proceedings Library (OPL) 364, 1994
51994
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20