Sciweavers

166 search results - page 29 / 34
» Full Bayesian network classifiers
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
ECML
2006
Springer
15 years 1 months ago
Fisher Kernels for Relational Data
Abstract. Combining statistical and relational learning receives currently a lot of attention. The majority of statistical relational learning approaches focus on density estimatio...
Uwe Dick, Kristian Kersting
IDEAL
2000
Springer
15 years 1 months ago
Quantization of Continuous Input Variables for Binary Classification
Quantization of continuous variables is important in data analysis, especially for some model classes such as Bayesian networks and decision trees, which use discrete variables. Of...
Michal Skubacz, Jaakko Hollmén
67
Voted
ICONIP
2008
14 years 11 months ago
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
ICSE
2004
IEEE-ACM
15 years 9 months ago
Making Resource Decisions for Software Projects
Software metrics should support managerial decision making in software projects. We explain how traditional metrics approaches, such as regression-based models for cost estimation...
Norman E. Fenton, William Marsh, Martin Neil, Patr...