scispace - formally typeset
P

Pavel Laskov

Researcher at University of Tübingen

Publications -  76
Citations -  9269

Pavel Laskov is an academic researcher from University of Tübingen. The author has contributed to research in topics: Intrusion detection system & Anomaly detection. The author has an hindex of 36, co-authored 69 publications receiving 7953 citations. Previous affiliations of Pavel Laskov include Huawei & University of Delaware.

Papers
More filters

A linear least-squares algorithm for joint diagonalization

TL;DR: A new approach to approximate joint diagonalization of a set of matrices based on multiplicative updates and linear least-squares optimization is presented, which has the capability to perform blind source separation without requiring the usual prewhitening of the data.

Visualization of anomaly detection using prediction sensitivity

TL;DR: A novel method for visualization of anomaly detection and feature selection, based on prediction sensitivity, is proposed that allows an expert to discover informative features for separation of normal and attack instances.

Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371)

TL;DR: This workshop featured twenty-two invited talks from leading researchers within the secure learning community covering topics in adversarial learning, game-theoretic learning, collective classification, privacy-preserving learning, security evaluation metrics, digital forensics, authorship identification, adversarial advertisement detection, learning for offensive security, and data sanitization.
Book ChapterDOI

FPGA vs. multi-core CPUs vs. GPUs: hands-on experience with a sorting application

TL;DR: This work has considered FPGAs, multi-core CPUs in symmetric multi-CPU machines and GPUs and has created implementations for each platform, and has decided to go forward with the implementation written for multicore CPUs.
Book ChapterDOI

Incorporation of Application Layer Protocol Syntax into Anomaly Detection

TL;DR: A payload-based anomaly detection method is extended by incorporating structural information obtained from a protocol analyzer by computation of similarity between attributed tokens derived from a Protocol grammar.