Sciweavers

318 search results - page 47 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ACML
2009
Springer
15 years 4 months ago
Conditional Density Estimation with Class Probability Estimators
Many regression schemes deliver a point estimate only, but often it is useful or even essential to quantify the uncertainty inherent in a prediction. If a conditional density estim...
Eibe Frank, Remco R. Bouckaert
MOBISYS
2008
ACM
15 years 9 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
AI
2003
Springer
15 years 3 months ago
Summarizing Web Sites Automatically
This research is directed towards automating the Web Site summarization task. To achieve this objective, an approach, which applies machine learning and natural language processing...
Yongzheng Zhang, A. Nur Zincir-Heywood, Evangelos ...
ICIAP
2005
ACM
15 years 10 months ago
A Neural Adaptive Algorithm for Feature Selection and Classification of High Dimensionality Data
In this paper, we propose a novel method which involves neural adaptive techniques for identifying salient features and for classifying high dimensionality data. In particular a ne...
Elisabetta Binaghi, Ignazio Gallo, Mirco Boschetti...