-
3
-
-
0030211964
-
Bagging predictors
-
L. Breiman. Bagging predictors. Machine Learning, 24(2):123-140, 1996.
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
5
-
-
21844435105
-
Confidence intervals for the area under the roc curve
-
Advances in Neural Information Processing Systems
-
C. Cortes and M. Mohri. Confidence intervals for the area under the roc curve. In NIPS 2004: Advances in Neural Information Processing Systems, 2004.
-
(2004)
NIPS 2004
-
-
Cortes, C.1
Mohri, M.2
-
9
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
J. Z. Kolter and M. A. Maloof. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research, 7:2721-2744, 2006.
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
12
-
-
60349101742
-
Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
-
R. Perdisci, G. Gu, and W. Lee. Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems. In International Conference on Data Mining (ICDM), 2006.
-
(2006)
International Conference on Data Mining (ICDM)
-
-
Perdisci, R.1
Gu, G.2
Lee, W.3
-
13
-
-
50149118846
-
Classification of packed executables for accurate computer virus detection
-
R. Perdisci, A. Lanzi, and W. Lee. Classification of packed executables for accurate computer virus detection. Patter Recognition Letters, 29(14):1941-1946, 2008.
-
(2008)
Patter Recognition Letters
, vol.29
, Issue.14
, pp. 1941-1946
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
14
-
-
84904819430
-
Understanding how spammers steal your e-mail address: An analysis of the first six months of data from project honey pot
-
M. B. Prince, L. Holloway, E. Langheinrich, B. M. Dahl, and A. M. Keller. Understanding how spammers steal your e-mail address: An analysis of the first six months of data from project honey pot. In 2nd Conference on Email and Anti-Spam (CEAS), 2005.
-
(2005)
2nd Conference on Email and Anti-Spam (CEAS)
-
-
Prince, M.B.1
Holloway, L.2
Langheinrich, E.3
Dahl, B.M.4
Keller, A.M.5
-
16
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. Polyunpack: Automating the hidden-code extraction of unpack-executing malware. In Annual Computer Security Applications Conference (ACSAC), 2006.
-
(2006)
Annual Computer Security Applications Conference (ACSAC)
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
21
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In NDSS, 2006.
-
(2006)
NDSS
-
-
Wang, Y.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.T.7
-
24
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In CCS '07: 14th ACM conference on Computer and communications security, 2007.
-
(2007)
CCS '07: 14th ACM conference on Computer and communications security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
25
-
-
58549098163
-
Malicious codes detection based on ensemble learning
-
B. Zhang, J. Yin, J. Hao, D. Zhang, and S. Wang. Malicious codes detection based on ensemble learning. In Autonomic and Trusted Computing (ATC), 2007.
-
(2007)
Autonomic and Trusted Computing (ATC)
-
-
Zhang, B.1
Yin, J.2
Hao, J.3
Zhang, D.4
Wang, S.5
-
26
-
-
66749177958
-
Collecting autonomous spreading malware using high-interaction honeypots
-
J. Zhuge, T. Holz, X. Han, C. Song, and W. Zou. Collecting autonomous spreading malware using high-interaction honeypots. In ICICS 2007, 2007.
-
(2007)
ICICS 2007
-
-
Zhuge, J.1
Holz, T.2
Han, X.3
Song, C.4
Zou, W.5
|