-
2
-
-
16444373413
-
-
Software, Department of Computer Science, University of California, Berkeley
-
A. Aiken. MOSS: A system for detecting software plagiarism. Software, Department of Computer Science, University of California, Berkeley, http://www.cs.berkeley.edu/~aiken/moss.html, 1994.
-
(1994)
MOSS: a System for Detecting Software Plagiarism
-
-
Aiken, A.1
-
3
-
-
12244306014
-
-
Sams Publishing, Indianapolis, IN, 4th edition
-
Anonymous. Maximum Security. Sams Publishing, Indianapolis, IN, 4th edition, 2003.
-
(2003)
Maximum Security
-
-
-
4
-
-
0032645080
-
An empirical comparison of voting classification algorithms: Bagging, boosting, and variants
-
B. Bauer and R. Kohavi. An empirical comparison of voting classification algorithms: Bagging, boosting, and variants. Machine Learning, 36:105-139, 1999.
-
(1999)
Machine Learning
, vol.36
, pp. 105-139
-
-
Bauer, B.1
Kohavi, R.2
-
5
-
-
0026966646
-
A training algorithm for optimal margin classifiers
-
New York, NY, ACM Press
-
B. Boser, I. Guyon, and V. Vapnik. A training algorithm for optimal margin classifiers. In Proceedings of the Fourth Workshop on Computational Learning Theory, pages 144-152, New York, NY, 1992. ACM Press.
-
(1992)
Proceedings of the Fourth Workshop on Computational Learning Theory
, pp. 144-152
-
-
Boser, B.1
Guyon, I.2
Vapnik, V.3
-
7
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
Berkeley, CA, Advanced Computing Systems Association
-
M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In Proceedings of the Twelfth USENIX Security Symposium, Berkeley, CA, 2003. Advanced Computing Systems Association.
-
(2003)
Proceedings of the Twelfth USENIX Security Symposium
-
-
Christodorescu, M.1
Jha, S.2
-
9
-
-
0034250160
-
An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization
-
T. Dietterich. An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization. Machine Learning, 40:139-158, 2000.
-
(2000)
Machine Learning
, vol.40
, pp. 139-158
-
-
Dietterich, T.1
-
10
-
-
0031269184
-
On the optimality of the simple Bayesian classifier under zero-one loss
-
P. Domingos and M. Pazzani. On the optimality of the simple Bayesian classifier under zero-one loss. Machine Learning, 29:103-130, 1997.
-
(1997)
Machine Learning
, vol.29
, pp. 103-130
-
-
Domingos, P.1
Pazzani, M.2
-
12
-
-
85105809948
-
Inductive learning algorithms and representations for text categorization
-
New York, NY, ACM Press
-
S. Dumais, J. Platt, D. Heckerman, and M. Sahami. Inductive learning algorithms and representations for text categorization. In Proceedings of the Seventh International Conference on Information and Knowledge Management, pages 148-155, New York, NY, 1998. ACM Press.
-
(1998)
Proceedings of the Seventh International Conference on Information and Knowledge Management
, pp. 148-155
-
-
Dumais, S.1
Platt, J.2
Heckerman, D.3
Sahami, M.4
-
15
-
-
1842493961
-
Software forensics: Extending authorship analysis techniques to computer programs
-
Birmingham, UK, International Association of Forensic Linguists
-
A. Gray, P. Sallis, and S. MacDonell. Software forensics: Extending authorship analysis techniques to computer programs. In Proceedings of the Third Biannual Conference of the International Association of Forensic Linguists, pages 1-8, Birmingham, UK, 1997. International Association of Forensic Linguists.
-
(1997)
Proceedings of the Third Biannual Conference of the International Association of Forensic Linguists
, pp. 1-8
-
-
Gray, A.1
Sallis, P.2
MacDonell, S.3
-
17
-
-
0003987805
-
-
MIT Press, Cambridge, MA
-
D. Hand, H. Mannila, and P. Smyth. Principles of data mining. MIT Press, Cambridge, MA, 2001.
-
(2001)
Principles of Data Mining
-
-
Hand, D.1
Mannila, H.2
Smyth, P.3
-
19
-
-
0023960940
-
Detecting plagiarism in student Pascal programs
-
H. Jankowitz. Detecting plagiarism in student Pascal programs. Computer Journal, 31:1-8, 1988.
-
(1988)
Computer Journal
, vol.31
, pp. 1-8
-
-
Jankowitz, H.1
-
20
-
-
0000636553
-
Text categorization with support vector machines: Learning with many relevant features
-
Berlin, Springer-Verlag
-
T. Joachims. Text categorization with support vector machines: Learning with many relevant features. In Proceedings of the Tenth European Conference on Machine Learning, pages 487-494, Berlin, 1998. Springer-Verlag.
-
(1998)
Proceedings of the Tenth European Conference on Machine Learning
, pp. 487-494
-
-
Joachims, T.1
-
21
-
-
0037700468
-
Biologically inspired defenses against computer viruses
-
San Francisco, CA, Morgan Kaufmann
-
J. Kephart, G. Sorkin, W. Arnold, D. Chess, G. Tesauro, and S. White. Biologically inspired defenses against computer viruses. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, pages 985-996, San Francisco, CA, 1995. Morgan Kaufmann.
-
(1995)
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence
, pp. 985-996
-
-
Kephart, J.1
Sorkin, G.2
Arnold, W.3
Chess, D.4
Tesauro, G.5
White, S.6
-
24
-
-
12244274774
-
Authorship analysis: Identifying the authors of a program
-
Gaithersburg, MD, National Institute of Standards and Technology
-
I. Krsul and E. Spafford. Authorship analysis: Identifying the authors of a program. In Proceedings of the Eighteenth National Information Systems Security Conference, pages 514-524, Gaithersburg, MD, 1995. National Institute of Standards and Technology.
-
(1995)
Proceedings of the Eighteenth National Information Systems Security Conference
, pp. 514-524
-
-
Krsul, I.1
Spafford, E.2
-
26
-
-
84945708697
-
On relevance, probabilistic indexing and information retrieval
-
M. Maron and J. Kuhns. On relevance, probabilistic indexing and information retrieval. Journal of the ACM, 7:216-244, 1960.
-
(1960)
Journal of the ACM
, vol.7
, pp. 216-244
-
-
Maron, M.1
Kuhns, J.2
-
27
-
-
0034269416
-
Attacking malicious code: A report to the infosec research council
-
September/October
-
G. McGraw and G. Morisett. Attacking malicious code: A report to the Infosec Research Council. IEEE Software, pages 33-41, September/October 2000.
-
(2000)
IEEE Software
, pp. 33-41
-
-
McGraw, G.1
Morisett, G.2
-
28
-
-
12244271926
-
ROC software
-
Kurt Rossmann Laboratories for Radiologie Image Research, University of Chicago, Chicago, IL
-
C. Metz, Y. Jiang, H. MacMahon, R. Nishikawa, and X. Pan. ROC software. Web page, Kurt Rossmann Laboratories for Radiologie Image Research, University of Chicago, Chicago, IL, 2003.
-
(2003)
Web Page
-
-
Metz, C.1
Jiang, Y.2
MacMahon, H.3
Nishikawa, R.4
Pan, X.5
-
32
-
-
0003120218
-
Fast training of support vector machines using sequential minimal optimization
-
B. Schölkopf, C. Burges, and S. Mika, editors, MIT Press, Cambridge, MA
-
J. Platt. Fast training of support vector machines using sequential minimal optimization. In B. Schölkopf, C. Burges, and S. Mika, editors, Advances in Kernel Methods - Support Vector Learning. MIT Press, Cambridge, MA, 1998.
-
(1998)
Advances in Kernel Methods - Support Vector Learning
-
-
Platt, J.1
-
33
-
-
0003243224
-
Probabilities for SV machines
-
P. Bartlett, B. Schölkopf, D. Schuurmans, and A. Smola, editors, MIT Press, Cambridge, MA
-
J. Platt. Probabilities for SV machines. In P. Bartlett, B. Schölkopf, D. Schuurmans, and A. Smola, editors, Advances in Large-Margin Classifiers, pages 61-74. MIT Press, Cambridge, MA, 2000.
-
(2000)
Advances in Large-margin Classifiers
, pp. 61-74
-
-
Platt, J.1
-
34
-
-
0035283313
-
Robust classification for imprecise environments
-
F. Provost and T. Fawcett. Robust classification for imprecise environments. Machine Learning, 42:203-231, 2001.
-
(2001)
Machine Learning
, vol.42
, pp. 203-231
-
-
Provost, F.1
Fawcett, T.2
-
36
-
-
0009304541
-
A Bayesian approach to filtering junk e-mail
-
Menlo Park, CA, AAAI Press. Technical Report WS-98-05
-
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. A Bayesian approach to filtering junk e-mail. In Learning for Text Categorization: Papers from the 1998 AAAI Workshop, Menlo Park, CA, 1998. AAAI Press. Technical Report WS-98-05.
-
(1998)
Learning for Text Categorization: Papers from the 1998 AAAI Workshop
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
37
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Los Alamitos, CA, IEEE Press
-
M. Schultz, E. Eskin, E. Zadok, and S. Stolfo. Data mining methods for detection of new malicious executables. In Proceedings of the IEEE Symposium on Security and Privacy, pages 38-49, Los Alamitos, CA, 2001. IEEE Press.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
Stolfo, S.4
-
38
-
-
77953188431
-
Detecting malicious Java code using virtual machine auditing
-
Berkeley, CA, Advanced Computing Systems Association
-
S. Soman, C. Krintz, and G. Vigna. Detecting malicious Java code using virtual machine auditing. In Proceedings of the Twelfth USENIX Security Symposium, Berkeley, CA, 2003. Advanced Computing Systems Association.
-
(2003)
Proceedings of the Twelfth USENIX Security Symposium
-
-
Soman, S.1
Krintz, C.2
Vigna, G.3
-
39
-
-
0027677539
-
Software forensics: Can we track code to its authors?
-
E. Spafford and S. Weeber. Software forensics: Can we track code to its authors? Computers & Security, 12:585-595, 1993.
-
(1993)
Computers & Security
, vol.12
, pp. 585-595
-
-
Spafford, E.1
Weeber, S.2
-
41
-
-
0030216542
-
Neural networks for computer virus recognition
-
August 1996
-
G. Tesauro, J. Kephart, and G. Sorkin. Neural networks for computer virus recognition. IEEE Expert, 11:5-6, August 1996.
-
IEEE Expert
, vol.11
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.2
Sorkin, G.3
|