Sciweavers

318 search results - page 18 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
ML
2008
ACM
134views Machine Learning» more  ML 2008»
14 years 10 months ago
Multilabel classification via calibrated label ranking
Label ranking studies the problem of learning a mapping from instances to rankings over a predefined set of labels. Hitherto existing approaches to label ranking implicitly operat...
Johannes Fürnkranz, Eyke Hüllermeier, En...
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 3 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
ICTAI
2006
IEEE
15 years 4 months ago
Modeling and Recognition of Gesture Signals in 2D Space: A Comparison of NN and SVM Approaches
In this paper we introduce a novel technique for modeling and recognizing gesture signals in 2D space. This technique is based on measuring the direction of the gradient of the mo...
Farhad Dadgostar, Abdolhossein Sarrafzadeh, Chao F...
ICTAI
2010
IEEE
14 years 8 months ago
Support Vector Methods for Sentence Level Machine Translation Evaluation
Recent work in the field of machine translation (MT) evaluation suggests that sentence level evaluation based on machine learning (ML) can outperform the standard metrics such as B...
Antoine Veillard, Elvina Melissa, Cassandra Theodo...
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 4 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...