Sciweavers

3556 search results - page 21 / 712
» Can machine learning be secure
Sort
View
83
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Firewall fingerprinting
—Firewalls are critical security devices handling all traffic in and out of a network. Firewalls, like other software and hardware network devices, have vulnerabilities, which c...
Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex ...
94
Voted
ALT
2001
Springer
15 years 9 months ago
Learning Recursive Functions Refutably
Abstract. Learning of recursive functions refutably means that for every recursive function, the learning machine has either to learn this function or to refute it, i.e., to signal...
Sanjay Jain, Efim B. Kinber, Rolf Wiehagen, Thomas...
111
Voted
CGO
2009
IEEE
15 years 7 months ago
Automatic Feature Generation for Machine Learning Based Optimizing Compilation
Recent work has shown that machine learning can automate and in some cases outperform hand crafted compiler optimizations. Central to such an approach is that machine learning tec...
Hugh Leather, Edwin V. Bonilla, Michael O'Boyle
NOSSDAV
2010
Springer
15 years 5 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
84
Voted
LREC
2008
141views Education» more  LREC 2008»
15 years 2 months ago
Creating Glossaries Using Pattern-Based and Machine Learning Techniques
One of the aims of the Language Technology for eLearning project is to show that Natural Language Processing techniques can be employed to enhance the learning process. To this en...
Eline Westerhout, Paola Monachesi