Sciweavers

8381 search results - page 65 / 1677
» The security of machine learning
Sort
View
107
Voted
ML
2011
ACM
172views Machine Learning» more  ML 2011»
14 years 7 months ago
Checkpoint evolution for volatile correlation computing
Wenjun Zhou, Hui Xiong
71
Voted
ACSAC
2003
IEEE
15 years 5 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
15 years 5 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...