BibTeX records: Athul Harilal

download as .bib file

@article{DBLP:journals/jowua/HarilalTHCGMO18,
  author    = {Athul Harilal and
               Flavio Toffalini and
               Ivan Homoliak and
               John Henry Castellanos and
               Juan Guarnizo and
               Soumik Mondal and
               Mart{\'{\i}}n Ochoa},
  title     = {The Wolf Of {SUTD} {(TWOS):} {A} Dataset of Malicious Insider Threat
               Behavior Based on a Gamified Competition},
  journal   = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume    = {9},
  number    = {1},
  pages     = {54--85},
  year      = {2018},
  url       = {https://doi.org/10.22667/JOWUA.2018.03.31.054},
  doi       = {10.22667/JOWUA.2018.03.31.054},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jowua/HarilalTHCGMO18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fire/MondalHB18,
  author    = {Soumik Mondal and
               Athul Harilal and
               Alexander Binder},
  editor    = {Parth Mehta and
               Paolo Rosso and
               Prasenjit Majumder and
               Mandar Mitra},
  title     = {Corplab INLI@FIRE-2018: Identification of Indian Native Language using
               Pairwise Coupling},
  booktitle = {Working Notes of {FIRE} 2018 - Forum for Information Retrieval Evaluation,
               Gandhinagar, India, December 6-9, 2018},
  series    = {{CEUR} Workshop Proceedings},
  volume    = {2266},
  pages     = {77--81},
  publisher = {CEUR-WS.org},
  year      = {2018},
  url       = {http://ceur-ws.org/Vol-2266/T2-5.pdf},
  timestamp = {Wed, 12 Feb 2020 16:45:02 +0100},
  biburl    = {https://dblp.org/rec/conf/fire/MondalHB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ToffaliniHHBO18,
  author    = {Flavio Toffalini and
               Ivan Homoliak and
               Athul Harilal and
               Alexander Binder and
               Mart{\'{\i}}n Ochoa},
  title     = {Detection of Masqueraders Based on Graph Partitioning of File System
               Access Events},
  booktitle = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San
               Francisco, CA, USA, May 24, 2018},
  pages     = {217--227},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {https://doi.org/10.1109/SPW.2018.00037},
  doi       = {10.1109/SPW.2018.00037},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/ToffaliniHHBO18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HarilalTCGHO17,
  author    = {Athul Harilal and
               Flavio Toffalini and
               John Henry Castellanos and
               Juan Guarnizo and
               Ivan Homoliak and
               Mart{\'{\i}}n Ochoa},
  title     = {{TWOS:} {A} Dataset of Malicious Insider Threat Behavior Based on
               a Gamified Competition},
  booktitle = {Proceedings of the 2017 International Workshop on Managing Insider
               Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages     = {45--56},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3139923.3139929},
  doi       = {10.1145/3139923.3139929},
  timestamp = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/HarilalTCGHO17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/HuTHX15,
  author    = {Wuhua Hu and
               Wee Peng Tay and
               Athul Harilal and
               Gaoxi Xiao},
  title     = {Network infection source identification under the {SIRI} model},
  booktitle = {2015 {IEEE} International Conference on Acoustics, Speech and Signal
               Processing, {ICASSP} 2015, South Brisbane, Queensland, Australia,
               April 19-24, 2015},
  pages     = {1712--1716},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/ICASSP.2015.7178263},
  doi       = {10.1109/ICASSP.2015.7178263},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/icassp/HuTHX15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HuTHX14,
  author    = {Wuhua Hu and
               Wee Peng Tay and
               Athul Harilal and
               Gaoxi Xiao},
  title     = {Network infection source identification under the {SIRI} model},
  journal   = {CoRR},
  volume    = {abs/1410.2995},
  year      = {2014},
  url       = {http://arxiv.org/abs/1410.2995},
  archivePrefix = {arXiv},
  eprint    = {1410.2995},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/HuTHX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics