-
1
-
-
33750727688
-
Quantifying the Impact of Learning Algorithm Parameter Tuning
-
AAAI Press, Menlo Park, CA
-
N. Lavesson and P. Davidsson, "Quantifying the Impact of Learning Algorithm Parameter Tuning", Proceedings of the 21st AAAI National Conference on Artificial Intelligence, AAAI Press, Menlo Park, CA, 2006, pp. 395-400.
-
(2006)
Proceedings of the 21st AAAI National Conference on Artificial Intelligence
, pp. 395-400
-
-
Lavesson, N.1
Davidsson, P.2
-
2
-
-
0002900357
-
The Case against Accuracy Estimation for Comparing Induction Algorithms
-
Morgan Kaufmann, San Francisco, CA, USA
-
F. Provost, T. Fawcett, and R. Kohavi, "The Case against Accuracy Estimation for Comparing Induction Algorithms", Proceedings of the 15th International Conference on Machine Learning, Morgan Kaufmann, San Francisco, CA, USA, 1998, pp. 445-453.
-
(1998)
Proceedings of the 15th International Conference on Machine Learning
, pp. 445-453
-
-
Provost, F.1
Fawcett, T.2
Kohavi, R.3
-
3
-
-
85101511266
-
Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions
-
AAAI Press, Menlo Park, CA, USA
-
F. Provost and T. Fawcett, "Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions", Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, AAAI Press, Menlo Park, CA, USA, 1997, pp 43-48.
-
(1997)
Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining
, pp. 43-48
-
-
Provost, F.1
Fawcett, T.2
-
4
-
-
0003957032
-
-
2nd edition, Morgan Kaufmann, San Francisco, CA, USA
-
I.H. Witten and E. Frank, Data Mining: Practical Machine Learning Tools and Techniques (2nd edition), Morgan Kaufmann, San Francisco, CA, USA, 2005.
-
(2005)
Data Mining: Practical Machine Learning Tools and Techniques
-
-
Witten, I.H.1
Frank, E.2
-
5
-
-
0002284221
-
Learning Rules that Classify E-Mail
-
IOS Press, Amsterdam, the Netherlands
-
W. Cohen, "Learning Rules that Classify E-Mail", Advances in Inductive Logic Programming, IOS Press, Amsterdam, the Netherlands, 1996, pp. 124-143.
-
(1996)
Advances in Inductive Logic Programming
, pp. 124-143
-
-
Cohen, W.1
-
6
-
-
0032594950
-
Support Vector Machines for Spam Categorization
-
IEEE Press, New York City, NY, USA
-
H. Drucker, D. Wu, and V. Vapnik, "Support Vector Machines for Spam Categorization", IEEE Transactions on Neural Networks, 10(5), IEEE Press, New York City, NY, USA, 1999, pp. 1048-1054.
-
(1999)
IEEE Transactions on Neural Networks
, vol.10
, Issue.5
, pp. 1048-1054
-
-
Drucker, H.1
Wu, D.2
Vapnik, V.3
-
7
-
-
0043157171
-
Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach
-
I. Androutsopoulos, G. Paliouras, V. Karkaletsis, G. Sakkis, C.D. Spyropoulos, and P. Stamatopoulos, "Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach", Proceedings of the Workshop on Machine Learning and Textual Information Access, 4th European Conference on Principles and Practice of Knowledge Discovery in Databases, 2000, pp. 1-13.
-
(2000)
Proceedings of the Workshop on Machine Learning and Textual Information Access, 4th European Conference on Principles and Practice of Knowledge Discovery in Databases
, pp. 1-13
-
-
Androutsopoulos, I.1
Paliouras, G.2
Karkaletsis, V.3
Sakkis, G.4
Spyropoulos, C.D.5
Stamatopoulos, P.6
-
9
-
-
85126956858
-
Stacking Classifiers for Anti-spam Filtering of E-mail
-
G. Sakkis, I. Androutsopoulos, G. Paliouras, V. Karkaletsis, C.D. Spyropoulos, and P. Stamatopoulos, "Stacking Classifiers for Anti-spam Filtering of E-mail", Proceedings of the 6th Conference on Empirical Methods in Natural Language Processing, 2001.
-
(2001)
Proceedings of the 6th Conference on Empirical Methods in Natural Language Processing
-
-
Sakkis, G.1
Androutsopoulos, I.2
Paliouras, G.3
Karkaletsis, V.4
Spyropoulos, C.D.5
Stamatopoulos, P.6
-
10
-
-
33847673255
-
Learning to Classify E-Mail
-
177, Elsevier, Amsterdam, the Netherlands
-
I. Koprinska, J. Poon, J. Clark, and J. Chan, "Learning to Classify E-Mail", Information Sciences, 177, Elsevier, Amsterdam, the Netherlands, 2007, pp. 2167-2187.
-
(2007)
Information Sciences
, pp. 2167-2187
-
-
Koprinska, I.1
Poon, J.2
Clark, J.3
Chan, J.4
-
11
-
-
34548553145
-
Categorization and Keyword Identification of Unlabeled Documents
-
New York City, NY, USA
-
N. Kang, C. Domeniconi, and D. Barbara, "Categorization and Keyword Identification of Unlabeled Documents", Proceedings of the 5th IEEE International Conference on Data Mining, IEEE Press, New York City, NY, USA, 2005, pp. 677-680.
-
(2005)
Proceedings of the 5th IEEE International Conference on Data Mining, IEEE Press
, pp. 677-680
-
-
Kang, N.1
Domeniconi, C.2
Barbara, D.3
-
12
-
-
51349150049
-
-
EULA Analyzer http://www.spywareguide.com/analyze/ Last checked 2008-01-04.
-
EULA Analyzer http://www.spywareguide.com/analyze/ Last checked 2008-01-04.
-
-
-
-
14
-
-
33750368009
-
Naive Bayes for Text Classification with Unbalanced Classes
-
Springer, Berlin, Germany
-
E. Frank, and R.R. Bouckaert, "Naive Bayes for Text Classification with Unbalanced Classes", Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, Springer, Berlin, Germany, 2006, pp. 503-510.
-
(2006)
Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases
, pp. 503-510
-
-
Frank, E.1
Bouckaert, R.R.2
-
15
-
-
51349111045
-
Exploring Spyware Effects
-
Helsinki, Finland
-
M. Boldt, B. Carlsson, and A. Jacobsson, "Exploring Spyware Effects", Proceedings of the 8th Nordic Workshop on Secure IT Systems (NordSec04), Helsinki, Finland, 2004.
-
(2004)
Proceedings of the 8th Nordic Workshop on Secure IT Systems (NordSec04)
-
-
Boldt, M.1
Carlsson, B.2
Jacobsson, A.3
-
17
-
-
24344464891
-
The Spyware Nightmare
-
IEEE Press, New York City, NY, USA
-
P. McFedries, "The Spyware Nightmare", IEEE Spectrum, 42(8), IEEE Press, New York City, NY, USA, 2005, pp. 72-72.
-
(2005)
IEEE Spectrum
, vol.42
, Issue.8
, pp. 72-72
-
-
McFedries, P.1
-
18
-
-
23344449408
-
What Do Consumers Really Know About Spyware?
-
ACM Press, New York City, NY, USA
-
X. Zhang, "What Do Consumers Really Know About Spyware?", Communications of the ACM, 48(8), ACM Press, New York City, NY, USA, 2005, pp. 44-48.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 44-48
-
-
Zhang, X.1
-
19
-
-
51349101937
-
-
S. Fox, Spyware- The Threat of Unwanted Software Programs is Changing the Way People use the Internet, Pew Internet and American Life Project, 2005. http://www.pewinternet.org/pdfs/PIP_Spyware_Report_July_05.pdf Last checked 2008-01-04.
-
S. Fox, "Spyware- The Threat of Unwanted Software Programs is Changing the Way People use the Internet", Pew Internet and American Life Project, 2005. http://www.pewinternet.org/pdfs/PIP_Spyware_Report_July_05.pdf Last checked 2008-01-04.
-
-
-
-
20
-
-
51349166423
-
-
B. Robertsson, Five Major Categories of Spyware, Consumer Web Watch, October 21st, 2002. http://www.consumerwebwatch.org/dynamic/privacy- investigations-categories-spy.cfm Last checked: 2008-01-04.
-
B. Robertsson, "Five Major Categories of Spyware", Consumer Web Watch, October 21st, 2002. http://www.consumerwebwatch.org/dynamic/privacy- investigations-categories-spy.cfm Last checked: 2008-01-04.
-
-
-
-
21
-
-
51349154414
-
-
N. Good, J. Grossklags, D. Thaw, A. Perzanowski, D.K. Mulligan, J. and Konstan, User Choices and Regret: Understanding Users' Decision Process about Consensually Acquired Spyware, I/S Law and Policy for the Information Society, 2(2), ISJLP, Columbus, OH, USA, 2006, pp. 283-344.
-
N. Good, J. Grossklags, D. Thaw, A. Perzanowski, D.K. Mulligan, J. and Konstan, "User Choices and Regret: Understanding Users' Decision Process about Consensually Acquired Spyware", I/S Law and Policy for the Information Society, 2(2), ISJLP, Columbus, OH, USA, 2006, pp. 283-344.
-
-
-
-
22
-
-
51349126543
-
-
M. McCardle, How Spyware Fits into Defence in Depth, SANS Reading Room, SANS Institute, 2003. http://www.sans.org/rr/papers/index.php?id= 905 Last checked 2008-01-04.
-
M. McCardle, "How Spyware Fits into Defence in Depth", SANS Reading Room, SANS Institute, 2003. http://www.sans.org/rr/papers/index.php?id= 905 Last checked 2008-01-04.
-
-
-
-
23
-
-
51349123699
-
-
K. Townsend, Spyware, Adware, and Peer-to-Peer Networks: The Hidden Threat to Corporate Security, PestPatrol, 2003. http://www.pestpatrol. com/Whitepapers/CorporateSecurity0403.asp Last checked 2008-01-04.
-
K. Townsend, "Spyware, Adware, and Peer-to-Peer Networks: The Hidden Threat to Corporate Security", PestPatrol, 2003. http://www.pestpatrol. com/Whitepapers/CorporateSecurity0403.asp Last checked 2008-01-04.
-
-
-
-
24
-
-
51349144245
-
-
M. Boldt, Privacy-Invasive Software - Exploring Effects and Countermeasures, Licentiate Thesis Series No. 2007:01, School of Engineering, Blekinge Institute of Technology, Sweden, 2007.
-
M. Boldt, "Privacy-Invasive Software - Exploring Effects and Countermeasures", Licentiate Thesis Series No. 2007:01, School of Engineering, Blekinge Institute of Technology, Sweden, 2007.
-
-
-
-
25
-
-
51349086544
-
-
CNET Download.com http://www.download.com Last checked 2008-01-04.
-
CNET Download.com http://www.download.com Last checked 2008-01-04.
-
-
-
-
26
-
-
51349128857
-
-
Spyware Guide http://www.spywareguide.com Last checked 2008-01-04.
-
Spyware Guide http://www.spywareguide.com Last checked 2008-01-04.
-
-
-
-
27
-
-
51349096216
-
-
A. McCallum, and K. Nigam, A Comparison of Event Models for Naive Bayes Text Classification, Proceedings of the AAAI98 Workshop on Learning for Text Categorization, Technical Report WS-98-05, AAAI Press, Menlo Park, CA, USA, 1998, pp. 4148.
-
A. McCallum, and K. Nigam, "A Comparison of Event Models for Naive Bayes Text Classification", Proceedings of the AAAI98 Workshop on Learning for Text Categorization, Technical Report WS-98-05, AAAI Press, Menlo Park, CA, USA, 1998, pp. 4148.
-
-
-
-
28
-
-
22944460214
-
Multinomial Naive Bayes for Text Categorization Revisited
-
Springer, Heidelberg, Germany
-
A.M. Kibriya, E. Frank, B. Pfahringer, and G. Holmes, "Multinomial Naive Bayes for Text Categorization Revisited", Proceedings of the 7th Australian Joint Conference on Artificial Intelligence, Springer, Heidelberg, Germany, 2004, pp. 488-499.
-
(2004)
Proceedings of the 7th Australian Joint Conference on Artificial Intelligence
, pp. 488-499
-
-
Kibriya, A.M.1
Frank, E.2
Pfahringer, B.3
Holmes, G.4
-
29
-
-
51349165036
-
-
Adaware http://www.lavasoft.com Last checked 2008-01-04.
-
Adaware http://www.lavasoft.com Last checked 2008-01-04.
-
-
-
-
30
-
-
51349091683
-
-
Niklas Lavesson, Blekinge Institute of Technology, 2007. http://www.bth.se/tek/nla Last accessed 2008-01-04.
-
Niklas Lavesson, Blekinge Institute of Technology, 2007. http://www.bth.se/tek/nla Last accessed 2008-01-04.
-
-
-
-
31
-
-
0042847140
-
Inference for the Generalization Error
-
Springer, Amsterdam, the Netherlands
-
C. Nadeau and Y. Bengio, "Inference for the Generalization Error", Machine Learning, 52(3), Springer, Amsterdam, the Netherlands, 2003, pp. 239-281.
-
(2003)
Machine Learning
, vol.52
, Issue.3
, pp. 239-281
-
-
Nadeau, C.1
Bengio, Y.2
-
32
-
-
51349095336
-
A United States Perspective on the Ethical and Legal Issues of Spyware
-
New York City, NY, USA
-
J.C. Sipior, B.T. Ward, and G.R. Roselli, "A United States Perspective on the Ethical and Legal Issues of Spyware", Proceedings of the 7th International Conference on Electronic Commerce, ACM Press, New York City, NY, USA, 2005, pp. 738-743.
-
(2005)
Proceedings of the 7th International Conference on Electronic Commerce, ACM Press
, pp. 738-743
-
-
Sipior, J.C.1
Ward, B.T.2
Roselli, G.R.3
-
33
-
-
77953767524
-
Stopping Spyware at the Gate: A User of Privacy, Notice and Spyware
-
New York City, NY, USA
-
N. Good, R. Dhamija, J. Grossklags, D. Thaw, S. Aronowitz, D. Mulligan, and J. Konstan. "Stopping Spyware at the Gate: A User of Privacy, Notice and Spyware", Proceedings of the Symposium on Usable Privacy and Security, ACM Press, New York City, NY, USA, 2005, pp. 43-52.
-
(2005)
Proceedings of the Symposium on Usable Privacy and Security, ACM Press
, pp. 43-52
-
-
Good, N.1
Dhamija, R.2
Grossklags, J.3
Thaw, D.4
Aronowitz, S.5
Mulligan, D.6
Konstan, J.7
-
34
-
-
51349142410
-
-
State of Spyware Q2 2006 - A Review and Analysis of the Impact of Spyware on Consumers and Corporations, Webroot Software, Inc., 2006. http://h30307.www3.hp.com/pdf/SOS_Q206_USA.pdf Last accessed 2008-01-04.
-
State of Spyware Q2 2006 - A Review and Analysis of the Impact of Spyware on Consumers and Corporations, Webroot Software, Inc., 2006. http://h30307.www3.hp.com/pdf/SOS_Q206_USA.pdf Last accessed 2008-01-04.
-
-
-
-
35
-
-
51349150048
-
-
State of Spyware Q1 2005 - A Review and Analysis of the Impact of Spyware on Consumers and Corporations, Webroot Software, Inc., 2006. http://whitepapers.zdnet.co.uk/0,1000000651,260134901p.00.htm Last accessed 2008-01-04.
-
State of Spyware Q1 2005 - A Review and Analysis of the Impact of Spyware on Consumers and Corporations, Webroot Software, Inc., 2006. http://whitepapers.zdnet.co.uk/0,1000000651,260134901p.00.htm Last accessed 2008-01-04.
-
-
-
-
36
-
-
51349084766
-
-
EULAlyzer http://www.javacoolsoftware.com/eulalyzerpro.html Last checked 2008-01-04.
-
EULAlyzer http://www.javacoolsoftware.com/eulalyzerpro.html Last checked 2008-01-04.
-
-
-
|