Sciweavers

2604 search results - page 517 / 521
» Process Change Support Features
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
14 years 10 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JMLR
2006
132views more  JMLR 2006»
14 years 10 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
89
Voted
SIGIR
2008
ACM
14 years 10 months ago
Learning to rank at query-time using association rules
Some applications have to present their results in the form of ranked lists. This is the case of many information retrieval applications, in which documents must be sorted accordi...
Adriano Veloso, Humberto Mossri de Almeida, Marcos...
TMC
2008
134views more  TMC 2008»
14 years 10 months ago
A Hybrid Token-CDMA MAC Protocol for Wireless Ad Hoc Networks
Token passing medium access control (MAC) protocols are gaining interest amongst wireless ad hoc network researchers as they provide unrivalled advantages over the existing IEEE 80...
I-Sheng Liu, Fambirai Takawira, Hong-Jun Xu
CG
2004
Springer
14 years 10 months ago
Multi-channel publishing of interactive multimedia presentations
The ongoing convergence between TV and the Internet leads traditional broadcast companies to publish their content on the Internet. Interactive digital TV platforms, which support...
Steven Van Assche, Filip Hendrickx, Nico Oorts, Lo...