Detecting malicious behavior in computer networks via cost-sensitive and connectivity constrained classification
- Houping Xiao
- Jing Gao
- et al.
- 2017
- SDM 2017
This is our catalog of publications authored by IBM researchers, in collaboration with the global research community. It’s an ever-growing body of work that shows why IBM is one of the most important contributors to modern computing.