Sciweavers

29 search results - page 5 / 6
» Learning to Detect and Classify Malicious Executables in the...
Sort
View
CLEF
2010
Springer
13 years 6 months ago
Wiki Vandalysis - Wikipedia Vandalism Analysis - Lab Report for PAN at CLEF 2010
Wikipedia describes itself as the "free encyclopedia that anyone can edit". Along with the helpful volunteers who contribute by improving the articles, a great number of ...
Manoj Harpalani, Thanadit Phumprao, Megha Bassi, M...
HAIS
2010
Springer
13 years 10 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
CCS
2009
ACM
14 years 5 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
ICRA
2010
IEEE
137views Robotics» more  ICRA 2010»
13 years 3 months ago
Robot reinforcement learning using EEG-based reward signals
Abstract— Reinforcement learning algorithms have been successfully applied in robotics to learn how to solve tasks based on reward signals obtained during task execution. These r...
Iñaki Iturrate, Luis Montesano, Javier Ming...
CVPR
2011
IEEE
12 years 9 months ago
Effective 3D Object Detection and Regression Using Probabilistic Segmentation Features in CT Images
3D object detection and importance regression/ranking are at the core for semantically interpreting 3D medical images of computer aided diagnosis (CAD). In this paper, we propose ...
Le Lu, Jinbo Bi, Matthias Wolf, Marcos Salganicoff