Several researches were conducted to Ad Hoc networks because of their facility of deployment, no need of an infrastructure and many other features. Thus, they still present many un...
In this paper, we propose a new prototype learning/matching method that can be combined with support vector machines (SVM) in pattern recognition. This hybrid method has the follo...
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
We propose an active set algorithm to solve the convex quadratic programming (QP) problem which is the core of the support vector machine (SVM) training. The underlying method is ...
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...