TUM Logo

Thomas Stibor

Dr. Thomas Stibor

Alumni

E-Mail:
now at GSI Helmholtz Centre for Heavy Ion Research

Publications

2012   Evasion Attack of Multi-Class Linear Classifiers

Proceedings of the 16th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD)

2011   A Supervised Topic Transition Model for Detecting Malicious System Call Sequences

KDD Workshop on Knowledge Discovery, Modeling, and Simulation

  Artificial Immune Systems - 10th International Conference, ICARIS 2011, Cambridge, UK, July 18-21, 2011. Proceeding


2010   On Immunological Memory as a Function of a Recursive Proliferation Process

15th IEEE International Conference on Engineering of Complex Computer Systems

  Efficient Collapsed Gibbs Sampling For Latent Dirichlet Allocation

Asian Conference on Machine Learning (ACML)

  A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods

A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods

2009   Foundations of r-contiguous Matching in Negative Selection for Anomaly Detection

Natural Computing

  Geometrical Insights into the Dendritic Cell Algorithm

Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-2009)

2008   An Empirical Study of Self/Non-Self Discrimination in Binary Data with a Kernel Estimator

Proceedings of the 7th International Conference on Artificial Immune Systems (ICARIS)

  Discriminating Self from Non-Self with Finite Mixtures of Multivariate Bernoulli Distributions

Proceedings of the Genetic and Evolutionary Computation Conference (GECCO)

  Theoretical Advances in Artificial Immune Systems

Theoretical Computer Science

2007   Phase Transition and the Computational Complexity of Generating r-contiguous Detectors

Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS-2007)

  Comments on Real-Valued Negative Selection vs. Real-Valued Positive Selection and One-Class SVM

Proceedings of the Congress on Evolutionary Computation (CEC-2007)

  Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques

Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks

2006   Artificial Immune Systems for IT-Security

it-Information Technology (Systems Biology and Information Technology)

  On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions

Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)

  On Permutation Masks in Hamming Negative Selection

Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)

  The Link between r-contiguous Detectors and k-CNF Satisfiability

Proceedings of the Congress on Evolutionary Computation (CEC-2006)

  Generalization Regions in Hamming Negative Selection

Intelligent Information Systems (IIS-2006)

  On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection


2005   Is Negative Selection Appropriate for Anomaly Detection ?

Proceedings of the ACM SIGEVO Genetic and Evolutionary Computation Conference (GECCO-2005)

  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques

Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS-2005)

  On the Appropriateness of Negative Selection defined over Hamming Shape-Space as a Network Intrusion Detection System

Proceedings of the Congress on Evolutionary Computation (CEC-2005)

2004   An Investigation of R-Chunk Detector Generation on Higher Alphabets

Genetic and Evolutionary Computation GECCO 2004