Sciweavers

318 search results - page 19 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
ML
2010
ACM
155views Machine Learning» more  ML 2010»
14 years 8 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
IEEEVAST
2010
14 years 4 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen
ESANN
2000
14 years 11 months ago
Algorithmic approaches to training Support Vector Machines: a survey
: Support Vector Machines (SVMs) have become an increasingly popular tool for machine learning tasks involving classi cation, regression or novelty detection. They exhibit good gen...
Colin Campbell
IJON
2008
186views more  IJON 2008»
14 years 10 months ago
Computational analysis and learning for a biologically motivated model of boundary detection
In this work we address the problem of boundary detection by combining ideas and approaches from biological and computational vision. Initially, we propose a simple and efficient ...
Iasonas Kokkinos, Rachid Deriche, Olivier D. Fauge...
BMVC
2010
14 years 8 months ago
Generalized RBF feature maps for Efficient Detection
Kernel methods yield state-of-the-art performance in certain applications such as image classification and object detection. However, large scale problems require machine learning...
Sreekanth Vempati, Andrea Vedaldi, Andrew Zisserma...