Sciweavers

7544 search results - page 1371 / 1509
» Network Forensics Analysis
Sort
View
DIMVA
2007
15 years 5 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
DIMVA
2007
15 years 5 months ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song
LREC
2010
201views Education» more  LREC 2010»
15 years 5 months ago
Cultural Heritage: Knowledge Extraction from Web Documents
This article presents the use of NLP techniques (text mining, text analysis) to develop specific tools that allow to create linguistic resources related to the cultural heritage d...
Eva Sassolini, Alessandra Cinini
LREC
2010
150views Education» more  LREC 2010»
15 years 5 months ago
A Corpus for Evaluating Semantic Multilingual Web Retrieval Systems: The Sense Folder Corpus
In this paper, we present the multilingual Sense Folder Corpus. After the analysis of different corpora, we describe the requirements that have to be satisfied for evaluating sema...
Ernesto William De Luca
LREC
2010
197views Education» more  LREC 2010»
15 years 5 months ago
Automatic Annotation of Co-Occurrence Relations
We introduce a method for automatically labelling edges of word co-occurrence graphs with semantic relations. Therefore we only make use of training data already contained within ...
Dirk Goldhahn, Uwe Quasthoff
« Prev « First page 1371 / 1509 Last » Next »