— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
Remotely-sensed images of the earth’s surface are used across a wide range of industries and applications including agriculture, mining, defence, geography and geology, to name ...
R. Ian Faulconbridge, Mark R. Pickering, Michael J...
When mining a large database, the number of patterns discovered can easily exceed the capabilities of a human user to identify interesting results. To address this problem, variou...
It is well known that different types of social ties have essentially different influence between people. However, users in online social networks rarely categorize their contact...
To increase the relevancy of local patterns discovered from noisy relations, it makes sense to formalize error-tolerance. Our starting point is to address the limitations of state...