Sciweavers

318 search results - page 37 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
BMCBI
2007
135views more  BMCBI 2007»
14 years 10 months ago
Detecting multivariate differentially expressed genes
Background: Gene expression is governed by complex networks, and differences in expression patterns between distinct biological conditions may therefore be complex and multivariat...
Roland Nilsson, José M. Peña, Johan ...
ICCS
2007
Springer
15 years 4 months ago
Learning Common Outcomes of Communicative Actions Represented by Labeled Graphs
We build a generic methodology based on learning and reasoning to detect specific attitudes of human agents and patterns of their interactions. Human attitudes are determined in te...
Boris Galitsky, Boris Kovalerchuk, Sergei O. Kuzne...
CCR
2006
136views more  CCR 2006»
14 years 10 months ago
Traffic classification on the fly
The early detection of applications associated with TCP flows is an essential step for network security and traffic engineering. The classic way to identify flows, i.e. looking at...
Laurent Bernaille, Renata Teixeira, Ismael Akodken...
77
Voted
ENTCS
2010
111views more  ENTCS 2010»
14 years 7 months ago
Fundamental Nano-Patterns to Characterize and Classify Java Methods
Fundamental nano-patterns are simple, static, binary properties of Java methods, such as ObjectCreator and Recursive. We present a provisional catalogue of 17 such nano-patterns. ...
Jeremy Singer, Gavin Brown, Mikel Luján, Ad...
JCS
2002
103views more  JCS 2002»
14 years 9 months ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...