-
1
-
-
38349041265
-
-
NCSA Study, http://www.staysafeonline.info/pdf/safety_study_2005.pdf
-
NCSA Study, http://www.staysafeonline.info/pdf/safety_study_2005.pdf
-
-
-
-
2
-
-
38349012637
-
-
Symantec Internet Security Threat Report January-June
-
Symantec Internet Security Threat Report (January-June 2004), www.symantec.com
-
(2004)
-
-
-
4
-
-
34547152659
-
-
Symantec 2006 Security Report, http://www.symantec.com/specprog/ threatreport/ entwhitepaper_symantec_internet_security_threat_report_×
-
(2006)
Security Report
-
-
Symantec1
-
5
-
-
38349017753
-
-
Tahan, G, Glezer, C, Elovici, Y, eDare- Early Detection Alert and Response to Electronic Threats, Working Paper, Deutsche Telekom Labs at Ben Gurion University
-
Tahan, G., Glezer, C., Elovici, Y.: eDare- Early Detection Alert and Response to Electronic Threats, Working Paper, Deutsche Telekom Labs at Ben Gurion University
-
-
-
-
6
-
-
0034838197
-
Data Mining Methods for Detection of New Malicious Executables
-
Schultz, M., Eskin, E., Zadok, E., Stolfo, S.: Data Mining Methods for Detection of New Malicious Executables. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 178-184(2001)
-
(2001)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 178-184
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
Stolfo, S.4
-
7
-
-
18844362133
-
-
Abou-Assaleh, T, Cercone, N, Keselj, V, Sweidan, R, N-gram based Detection of New Malicious Code. In: Proc. of the 28th Annual International Computer Software and Applications Conference COMPSAC'04, 2004
-
Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R.: N-gram based Detection of New Malicious Code. In: Proc. of the 28th Annual International Computer Software and Applications Conference (COMPSAC'04) (2004)
-
-
-
-
8
-
-
12244279567
-
Learning to detect malicious exécutables in the wild
-
ACM Press, New York, NY
-
Kolter, J.Z., Maloof, M.A.: Learning to detect malicious exécutables in the wild. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 470-478. ACM Press, New York, NY (2004)
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 470-478
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
9
-
-
38349077779
-
-
Quinlan, J.R.: C4.5: Programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)
-
Quinlan, J.R.: C4.5: Programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)
-
-
-
-
10
-
-
38349072982
-
-
Weka software
-
Weka software, http://www.cs.waikato.ac.nz/ml/weka/
-
-
-
-
11
-
-
46149134436
-
Fusion, propagation, and structuring in belief networks
-
Pearl, J.: Fusion, propagation, and structuring in belief networks. Artificial Intelligence 29(3), 241-288 (1986)
-
(1986)
Artificial Intelligence
, vol.29
, Issue.3
, pp. 241-288
-
-
Pearl, J.1
-
14
-
-
0033569406
-
Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring
-
Golub, T., Slonim, D., Tamaya, P., Huard, C., Gaasenbeek, M., Mesirov, J., Coller, H., Loh, M., Downing, J., Caligiuri, M., Bloomfield, C., Lander, E.: Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring. Science 286, 531-537 (1999)
-
(1999)
Science
, vol.286
, pp. 531-537
-
-
Golub, T.1
Slonim, D.2
Tamaya, P.3
Huard, C.4
Gaasenbeek, M.5
Mesirov, J.6
Coller, H.7
Loh, M.8
Downing, J.9
Caligiuri, M.10
Bloomfield, C.11
Lander, E.12
-
15
-
-
0001931577
-
An empirical comparison of voting classification Algorithms. Bagging, Boosting, and Variants
-
Bauer, E., Kohavi, R.: An empirical comparison of voting classification Algorithms. Bagging, Boosting, and Variants. Machine Learning 35, 1-38 (1999)
-
(1999)
Machine Learning
, vol.35
, pp. 1-38
-
-
Bauer, E.1
Kohavi, R.2
|