Sciweavers

1298 search results - page 119 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
IAT
2007
IEEE
15 years 9 months ago
Training Intelligent Agents in the Semantic Web Era: The Golf Advisor Agent
Agent training techniques study methods to embed empirical, inductive knowledge representations into intelligent agents, in dynamic, recursive or semi-automated ways, expressed in...
Ioannis N. Athanasiadis
PKDD
2004
Springer
168views Data Mining» more  PKDD 2004»
15 years 8 months ago
Combining Winnow and Orthogonal Sparse Bigrams for Incremental Spam Filtering
Spam filtering is a text categorization task that has attracted significant attention due to the increasingly huge amounts of junk email on the Internet. While current best-pract...
Christian Siefkes, Fidelis Assis, Shalendra Chhabr...
117
Voted
IJNSEC
2007
95views more  IJNSEC 2007»
15 years 3 months ago
Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions (CONFIDANT) is evaluated in the presence of tampering. CO...
Adam J. Rocke, Ronald F. DeMara, Simon Foo
126
Voted
CEC
2007
IEEE
15 years 9 months ago
On some symmetry based validity indices
—Identification of the correct number of clusters and the corresponding partitioning are two important considerations in clustering. In this paper, a newly developed point symme...
Sriparna Saha, Sanghamitra Bandyopadhyay
149
Voted
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
15 years 5 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...