Sciweavers

318 search results - page 22 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
IEEEIAS
2008
IEEE
15 years 4 months ago
Ensemble of One-Class Classifiers for Network Intrusion Detection System
To achieve high accuracy while lowering false alarm rates are major challenges in designing an intrusion detection system. In addressing this issue, this paper proposes an ensembl...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
ICML
2010
IEEE
14 years 11 months ago
Detecting Large-Scale System Problems by Mining Console Logs
Surprisingly, console logs rarely help operators detect problems in large-scale datacenter services, for they often consist of the voluminous intermixing of messages from many sof...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
GI
2007
Springer
15 years 4 months ago
Background Modeling Using Adaptive Cluster Density Estimation for Automatic Human Detection
: Detection is an inherent part of every advanced automatic tracking system. In this work we focus on automatic detection of humans by enhanced background subtraction. Background s...
Harish Bhaskar, Lyudmila Mihaylova, Simon Maskell
ECML
2006
Springer
15 years 1 months ago
Case-Based Label Ranking
Label ranking studies the problem of learning a mapping from instances to rankings over a predefined set of labels. We approach this setting from a case-based perspective and propo...
Klaus Brinker, Eyke Hüllermeier
ICSM
2006
IEEE
15 years 4 months ago
Using the Case-Based Ranking Methodology for Test Case Prioritization
The test case execution order affects the time at which the objectives of testing are met. If the objective is fault detection, an inappropriate execution order might reveal most ...
Paolo Tonella, Paolo Avesani, Angelo Susi