Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
The phenomenal growth of the world-wide web has made it the most popular Internet application today. Web caching and content distribution services have been recognized as valuable...
Chengdu Huang, Seejo Sebastine, Tarek F. Abdelzahe...
This work presents the design and evaluation of an activity recognition system for seven important motion related activities. The only sensor used is an Inertial Measurement Unit ...
Korbinian Frank, Maria Josefa Vera Nadales, Patric...
Feature selection, as a preprocessing step to machine learning, has been very effective in reducing dimensionality, removing irrelevant data, increasing learning accuracy, and imp...