Sciweavers

205 search results - page 13 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
KDD
2007
ACM
193views Data Mining» more  KDD 2007»
15 years 10 months ago
Joint optimization of wrapper generation and template detection
Many websites have large collections of pages generated dynamically from an underlying structured source like a database. The data of a category are typically encoded into similar...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen, Di Wu
74
Voted
MM
2006
ACM
113views Multimedia» more  MM 2006»
15 years 3 months ago
Transductive inference using multiple experts for brushwork annotation in paintings domain
Many recent studies perform annotation of paintings based on brushwork. In these studies the brushwork is modeled indirectly as part of the annotation of high-level artistic conce...
Yelizaveta Marchenko, Tat-Seng Chua, Ramesh Jain
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
15 years 7 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
INFORMATICALT
2006
364views more  INFORMATICALT 2006»
14 years 9 months ago
A Copyright Protection using Watermarking Algorithm
In this paper, a digital watermarking algorithm for copyright protection based on the concept of embed digital watermark and modifying frequency coefficients in discrete wavelet tr...
Aboul Ella Hassanien
83
Voted
DASC
2006
IEEE
15 years 1 months ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...