Sciweavers

934 search results - page 49 / 187
» Anomaly Detection Using Visualization and Machine Learning
Sort
View
VIZSEC
2004
Springer
15 years 3 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
ICML
2002
IEEE
15 years 10 months ago
Adaptive View Validation: A First Step Towards Automatic View Detection
Multi-view algorithms reduce the amount of required training data by partitioning the domain features into separate subsets or views that are sufficient to learn the target concep...
Ion Muslea, Steven Minton, Craig A. Knoblock
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 2 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
EVOW
2007
Springer
15 years 1 months ago
Classification of Cell Fates with Support Vector Machine Learning
In human mesenchymal stem cells the envelope surrounding the nucleus, as visualized by the nuclear lamina, has a round and flat shape. The lamina structure is considerably deformed...
Ofer M. Shir, Vered Raz, Roeland W. Dirks, Thomas ...
ICML
2004
IEEE
15 years 10 months ago
Decentralized detection and classification using kernel methods
We consider the problem of decentralized detection under constraints on the number of bits that can be transmitted by each sensor. In contrast to most previous work, in which the ...
XuanLong Nguyen, Martin J. Wainwright, Michael I. ...