Sciweavers

318 search results - page 7 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
ACL
2001
14 years 11 months ago
Detecting Problematic Turns in Human-Machine Interactions: Rule-induction Versus Memory-based Learning Approaches
We address the issue of on-line detection of communication problems in spoken dialogue systems. The usefulness is investigated of the sequence of system question types and the wor...
Antal van den Bosch, Emiel Krahmer, Marc Swerts
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 10 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
WWW
2008
ACM
15 years 10 months ago
Detecting image spam using visual features and near duplicate detection
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...
Bhaskar Mehta, Saurabh Nangia, Manish Gupta 0002, ...
ML
1998
ACM
113views Machine Learning» more  ML 1998»
14 years 9 months ago
Machine Learning for the Detection of Oil Spills in Satellite Radar Images
During a project examining the use of machine learning techniques for oil spill detection, we have encountered several essential questions that we believe deserve the attention of ...
Miroslav Kubat, Robert C. Holte, Stan Matwin
ACSAC
1999
IEEE
15 years 2 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner