-
1
-
-
18844362133
-
-
Abou-Assaleh T, Cercone N, Keselj V, Sweidan R. N-gram based detection of new malicious code. In: Proceedings of the 28th annual international computer software and applications conference; 2004
-
Abou-Assaleh T, Cercone N, Keselj V, Sweidan R. N-gram based detection of new malicious code. In: Proceedings of the 28th annual international computer software and applications conference; 2004.
-
-
-
-
4
-
-
0003637516
-
-
Doctoral dissertation, Sydney: School of Computing Science, University of Technology;
-
Buntine W. A theory of learning classification rules. Doctoral dissertation, Sydney: School of Computing Science, University of Technology; 1990.
-
(1990)
A theory of learning classification rules
-
-
Buntine, W.1
-
8
-
-
85015191605
-
Rule induction with CN2: Some recent improvements
-
session on learning;
-
Clark P, Boswell R. Rule induction with CN2: some recent improvements. In: Proc. of the European working session on learning; 1991. p. 151-63.
-
(1991)
Proc. of the European working
, pp. 151-163
-
-
Clark, P.1
Boswell, R.2
-
9
-
-
0000516376
-
Upper and lower probabilities induced by multi-valued mapping
-
Dempster A. Upper and lower probabilities induced by multi-valued mapping. Annals of Mathematical Statistics 2 (1967) 325-339
-
(1967)
Annals of Mathematical Statistics
, vol.2
, pp. 325-339
-
-
Dempster, A.1
-
10
-
-
65749105726
-
Malware signature builder and detection for executable code
-
Patent application;
-
Dolev S, Tzachar N. Malware signature builder and detection for executable code. Patent application; 2008.
-
(2008)
-
-
Dolev, S.1
Tzachar, N.2
-
11
-
-
0031269184
-
On the optimality of simple Bayesian classifier under zero-one loss
-
Domingos P., and Pazzani M. On the optimality of simple Bayesian classifier under zero-one loss. Machine Learning 29 (1997) 103-130
-
(1997)
Machine Learning
, vol.29
, pp. 103-130
-
-
Domingos, P.1
Pazzani, M.2
-
12
-
-
12144288329
-
Is combining classifiers with stacking better than selecting the best one?
-
Dzeroski S., and Zenko B. Is combining classifiers with stacking better than selecting the best one?. Machine Learning 54 3 (2004) 255-273
-
(2004)
Machine Learning
, vol.54
, Issue.3
, pp. 255-273
-
-
Dzeroski, S.1
Zenko, B.2
-
13
-
-
38349051945
-
-
Elovici Y, Shabtai A, Moskovitch R, Tahan G, Glezer C. Applying machine learning techniques for detection of malicious code in network traffic, KI; 2007. p. 44-50.
-
(2007)
Applying machine learning techniques for detection of malicious code in network traffic, KI
, pp. 44-50
-
-
Elovici, Y.1
Shabtai, A.2
Moskovitch, R.3
Tahan, G.4
Glezer, C.5
-
16
-
-
0033569406
-
Molecular classification of cancer: class discovery and class prediction by gene expression monitoring
-
Golub T.R., Slonim D.K., Tamayo P., Huard C., Gaasenbeek M., Mesirov J.P., et al. Molecular classification of cancer: class discovery and class prediction by gene expression monitoring. Science 286 (1999) 531-537
-
(1999)
Science
, vol.286
, pp. 531-537
-
-
Golub, T.R.1
Slonim, D.K.2
Tamayo, P.3
Huard, C.4
Gaasenbeek, M.5
Mesirov, J.P.6
-
20
-
-
34748865971
-
A feature selection and evaluation scheme for computer virus detection
-
Hong Kong;
-
Henchiri O, Japkowicz N. A feature selection and evaluation scheme for computer virus detection. In: Proceedings of ICDM-2006, Hong Kong; 2006. p. 891-95.
-
(2006)
Proceedings of ICDM-2006
, pp. 891-895
-
-
Henchiri, O.1
Japkowicz, N.2
-
21
-
-
0027580356
-
Very simple classification rules perform well on most commonly used datasets
-
Holte R. Very simple classification rules perform well on most commonly used datasets. Machine Learning 11 (1993) 63-91
-
(1993)
Machine Learning
, vol.11
, pp. 63-91
-
-
Holte, R.1
-
23
-
-
0002714543
-
Making large-scale support vector machine learning practical
-
Schölkopf B., Burges C., and A.S. (Eds), MIT Press, Cambridge, MA
-
Joachims T. Making large-scale support vector machine learning practical. In: Schölkopf B., Burges C., and A.S. (Eds). Advances in kernel methods: support vector machines (1998), MIT Press, Cambridge, MA
-
(1998)
Advances in kernel methods: support vector machines
-
-
Joachims, T.1
-
24
-
-
48349134267
-
Behavioral detection of malware: from a survey towards an established taxonomy
-
Jacob G., Debar H., and Filiol E. Behavioral detection of malware: from a survey towards an established taxonomy. Journal in Computer Virology 4 (2008) 251-266
-
(2008)
Journal in Computer Virology
, vol.4
, pp. 251-266
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
27
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
Karim E., Walenstein A., Lakhotia A., and Parida L. Malware phylogeny generation using permutations of code. Journal in Computer Virology 1 1-2 (2005) 13-23
-
(2005)
Journal in Computer Virology
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Karim, E.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
28
-
-
0025725905
-
Instance-based learning algorithms
-
Kibler D.A. Instance-based learning algorithms. Machine Learning (1991) 37-66
-
(1991)
Machine Learning
, pp. 37-66
-
-
Kibler, D.A.1
-
30
-
-
0032021555
-
On combining classifiers
-
Kittler J., Hatef M., Duin R., and Matas J. On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence 20 3 (1998) 226-239
-
(1998)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.20
, Issue.3
, pp. 226-239
-
-
Kittler, J.1
Hatef, M.2
Duin, R.3
Matas, J.4
-
32
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Kolter J., and Maloof M. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research 7 (2006) 2721-2744
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Kolter, J.1
Maloof, M.2
-
34
-
-
24144490154
-
Diversity in multiple classifier systems (editorial)
-
Kuncheva L.I. Diversity in multiple classifier systems (editorial). Information Fusion 6 1 (2005) 3-4
-
(2005)
Information Fusion
, vol.6
, Issue.1
, pp. 3-4
-
-
Kuncheva, L.I.1
-
39
-
-
77949902260
-
Unknown malcode detection using OPCODE representation
-
Denmark;
-
Moskovitch R, Feher, Tzachar N, Berger E, Gitelman M, Dolev S, et al. Unknown malcode detection using OPCODE representation. In: European conference on intelligence and security informatics 2008 (EuroISI08), Esbjerg, Denmark; 2008a.
-
(2008)
European conference on intelligence and security informatics 2008 (EuroISI08), Esbjerg
-
-
Moskovitch, R.1
Feher2
Tzachar, N.3
Berger, E.4
Gitelman, M.5
Dolev, S.6
et al7
-
41
-
-
65749113602
-
-
Moskovitch R, Nissim N, Elovici Y. Acquisition of malicious code using active learning. In: PinKDD; 2008c.
-
Moskovitch R, Nissim N, Elovici Y. Acquisition of malicious code using active learning. In: PinKDD; 2008c.
-
-
-
-
42
-
-
51849107341
-
Unknown malcode detection via text categorization and the imbalance problem
-
Taiwan;
-
Moskovitch R, Stopel D, Feher C, Nissim N, Elovici Y. Unknown malcode detection via text categorization and the imbalance problem. In: IEEE Intelligence and Security Informatics, Taiwan; 2008d.
-
(2008)
IEEE Intelligence and Security Informatics
-
-
Moskovitch, R.1
Stopel, D.2
Feher, C.3
Nissim, N.4
Elovici, Y.5
-
44
-
-
0023347981
-
Evidential reasoning using stochastic, simulation of causal models
-
Pearl J. Evidential reasoning using stochastic, simulation of causal models. Artificial Intelligence 32 2 (1987) 245-258
-
(1987)
Artificial Intelligence
, vol.32
, Issue.2
, pp. 245-258
-
-
Pearl, J.1
-
45
-
-
0003500248
-
-
Morgan Kaufmann Publishers, Inc., San Francisco, CA, USA
-
Quinlan J.R. C4.5: programs for machine learning (1993), Morgan Kaufmann Publishers, Inc., San Francisco, CA, USA
-
(1993)
C4.5: programs for machine learning
-
-
Quinlan, J.R.1
-
46
-
-
65749105512
-
-
Roy N, McCallum A. Toward optimal active learning through sampling estimation of error reduction. In: ICML; 2001.
-
Roy N, McCallum A. Toward optimal active learning through sampling estimation of error reduction. In: ICML; 2001.
-
-
-
-
52
-
-
0042868698
-
Support vector machine active learning with applications to text classification
-
Tong S., and Koller D. Support vector machine active learning with applications to text classification. Journal of Machine Learning Research 2 (2000) 45-66
-
(2000)
Journal of Machine Learning Research
, vol.2
, pp. 45-66
-
-
Tong, S.1
Koller, D.2
-
54
-
-
0003957032
-
-
Morgan Kaufmann Publishers, Inc., San Francisco, CA, USA
-
Witten I.H., and Frank E. Data mining: practical machine learning tools and techniques. 2nd ed. (2005), Morgan Kaufmann Publishers, Inc., San Francisco, CA, USA
-
(2005)
Data mining: practical machine learning tools and techniques. 2nd ed.
-
-
Witten, I.H.1
Frank, E.2
-
55
-
-
0026692226
-
Stacked generalization
-
Wolpert D.H. Stacked generalization. Neural Networks 5 (1992) 241-259
-
(1992)
Neural Networks
, vol.5
, pp. 241-259
-
-
Wolpert, D.H.1
-
56
-
-
38049020213
-
Malicious codes detection based on ensemble learning
-
Zhang B, Yin J, Hao J, Zhang D, Wang S. Malicious codes detection based on ensemble learning. Autonomic and trusted computing; 2007. p. 468-27.
-
(2007)
Autonomic and trusted computing
, pp. 468-527
-
-
Zhang, B.1
Yin, J.2
Hao, J.3
Zhang, D.4
Wang, S.5
|