Cost-effective diameter-two topologies: Analysis and evaluationGeorgios KathareiosCyriel Minkenberget al.2015SC 2015
Catch it if you can: Real-time network anomaly detection with low false alarm ratesGeorgios KathareiosAndreea Anghelet al.2017ICMLA 2017