-
2
-
-
27144531570
-
A study of the behavior of several methods for balancing machine learning training data
-
G. Batista, R. Prati, and M. Monard. A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explorations Newsletter, 2004.
-
(2004)
ACM SIGKDD Explorations Newsletter
-
-
Batista, G.1
Prati, R.2
Monard, M.3
-
6
-
-
77954718895
-
-
University of Illinois at Urbana-Champaign Database and Information Systems Laboratory
-
J. Han. Illimine project. University of Illinois at Urbana-Champaign Database and Information Systems Laboratory, 2005.
-
(2005)
Illimine Project
-
-
Han, J.1
-
9
-
-
54849439170
-
Detecting intrusion transactions in databases using data item dependencies and anomaly analysis
-
November
-
S. Hashemi, Y. Yang, D. Zabihzadeh, and M. Kangavari. Detecting intrusion transactions in databases using data item dependencies and anomaly analysis. Expert Systems, 25(5), November 2008.
-
(2008)
Expert Systems
, vol.25
, Issue.5
-
-
Hashemi, S.1
Yang, Y.2
Zabihzadeh, D.3
Kangavari, M.4
-
15
-
-
69449099775
-
Classification of software behaviors for failure detection: A discriminative pattern mining approach
-
D. Lo, H. Cheng, J. Han, S. Khoo, and C. Sun. Classification of software behaviors for failure detection: A discriminative pattern mining approach. In Conference on Knowledge discovery and data mining. ACM SIG-KDD, 2009.
-
Conference on Knowledge Discovery and Data Mining. ACM SIG-KDD, 2009
-
-
Lo, D.1
Cheng, H.2
Han, J.3
Khoo, S.4
Sun, C.5
-
17
-
-
24344458137
-
Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy
-
H. Peng, F. Long, and C. Ding. Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans. Pattern Anal. Mach. Intell., 27, 2005.
-
(2005)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.27
-
-
Peng, H.1
Long, F.2
Ding, C.3
-
20
-
-
18844437024
-
Detection of injected, dynamically generated, and obfuscated malicious code
-
J. Rabek, R. Khazan, S. Lewandowski, and R. Cunningham. Detection of injected, dynamically generated, and obfuscated malicious code. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, pages 76-82, 2003.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 76-82
-
-
Rabek, J.1
Khazan, R.2
Lewandowski, S.3
Cunningham, R.4
-
24
-
-
2342663706
-
Virus detection using data mining techniques
-
J. Wang, P. Deng, Y. Fan, L. Jaw, and Y. Liu. Virus detection using data mining techniques. In Proceedings of IEEE International Conference on Data Mining, 2003.
-
Proceedings of IEEE International Conference on Data Mining, 2003
-
-
Wang, J.1
Deng, P.2
Fan, Y.3
Jaw, L.4
Liu, Y.5
-
27
-
-
54849412646
-
An intelligent pe-malware detection system based on association mining
-
Y. Ye, D. Wang, T. Li, and D. Ye. An intelligent pe-malware detection system based on association mining. In Journal in Computer Virology, 2008.
-
(2008)
Journal in Computer Virology
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
|