Sciweavers

409 search results - page 26 / 82
» Review spam detection
Sort
View
CF
2008
ACM
15 years 1 months ago
Exact multi-pattern string matching on the cell/b.e. processor
String searching is the computationally intensive kernel of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filter...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
16 years 8 days ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
GECCO
2003
Springer
147views Optimization» more  GECCO 2003»
15 years 5 months ago
Developing an Immunity to Spam
Immune systems protect animals from pathogens, so why not apply a similar model to protect computers? Several researchers have investigated the use of an artificial immune system ...
Terri Oda, Tony White
NSPW
2006
ACM
15 years 5 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald