Sciweavers

596 search results - page 6 / 120
» Detecting worm variants using machine learning
Sort
View
ICML
2008
IEEE
16 years 12 days ago
Learning to classify with missing and corrupted features
After a classifier is trained using a machine learning algorithm and put to use in a real world system, it often faces noise which did not appear in the training data. Particularl...
Ofer Dekel, Ohad Shamir
93
Voted
NSPW
2006
ACM
15 years 5 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 3 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
AAAI
2008
15 years 1 months ago
A Case Study on the Critical Role of Geometric Regularity in Machine Learning
An important feature of many problem domains in machine learning is their geometry. For example, adjacency relationships, symmetries, and Cartesian coordinates are essential to an...
Jason Gauci, Kenneth O. Stanley
ECIR
2007
Springer
15 years 1 months ago
Automatic Morphological Query Expansion Using Analogy-Based Machine Learning
Information retrieval systems (IRSs) usually suffer from a low ability to recognize a same idea that is expressed in different forms. A way of improving these systems is to take ...
Fabienne Moreau, Vincent Claveau, Pascale Sé...