Sciweavers

8381 search results - page 65 / 1677
» The security of machine learning
Sort
View
151
Voted
ML
2011
ACM
172views Machine Learning» more  ML 2011»
14 years 11 months ago
Checkpoint evolution for volatile correlation computing
Wenjun Zhou, Hui Xiong
ACSAC
2003
IEEE
15 years 10 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
15 years 9 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...