Sciweavers

596 search results - page 6 / 120
» Detecting worm variants using machine learning
Sort
View
80
Voted
ICML
2008
IEEE
15 years 10 months ago
Learning to classify with missing and corrupted features
After a classifier is trained using a machine learning algorithm and put to use in a real world system, it often faces noise which did not appear in the training data. Particularl...
Ofer Dekel, Ohad Shamir
NSPW
2006
ACM
15 years 3 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 1 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
AAAI
2008
14 years 12 months ago
A Case Study on the Critical Role of Geometric Regularity in Machine Learning
An important feature of many problem domains in machine learning is their geometry. For example, adjacency relationships, symmetries, and Cartesian coordinates are essential to an...
Jason Gauci, Kenneth O. Stanley
ECIR
2007
Springer
14 years 11 months ago
Automatic Morphological Query Expansion Using Analogy-Based Machine Learning
Information retrieval systems (IRSs) usually suffer from a low ability to recognize a same idea that is expressed in different forms. A way of improving these systems is to take ...
Fabienne Moreau, Vincent Claveau, Pascale Sé...