-
1
-
-
84904804274
-
A game theoretic model of spam e-mailing
-
Palo Alto, CA, July 21-July 22
-
Androutsopoulos I, Magirou EF, Vassilakis DK (2005) A game theoretic model of spam e-mailing. In: Proceedings of the 2nd conference on email and anti-spam, Palo Alto, CA, July 21-July 22, pp 1-8
-
(2005)
Proceedings of the 2nd Conference on Email and Anti-spam
, pp. 1-8
-
-
Androutsopoulos, I.1
Magirou, E.F.2
Vassilakis, D.K.3
-
2
-
-
0003981511
-
-
2 Society for Industrial and Applied Mathematics Philadelphia, PA 0946.91001
-
Basar T, Olsder GJ (1999) Dynamic noncooperative game theory, 2nd edn. Society for Industrial and Applied Mathematics, Philadelphia, PA
-
(1999)
Dynamic Noncooperative Game Theory
-
-
Basar, T.1
Olsder, G.J.2
-
3
-
-
84926078662
-
-
Cambridge University Press Cambridge, United Kingdom 1114.91001 10.1017/CBO9780511546921
-
Cesa-Bianchi N, Lugosi G (2006) Prediction, learning, and games. Cambridge University Press, Cambridge, United Kingdom
-
(2006)
Prediction, Learning, and Games
-
-
Cesa-Bianchi, N.1
Lugosi, G.2
-
4
-
-
12244295760
-
Adversarial classification
-
New York, NY, August 22-August 25
-
Dalvi N, Domingos P, Mausam, Sanghai S, Verma D (2004) Adversarial classification. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining, New York, NY, August 22-August 25, pp 99-108
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam3
Sanghai, S.4
Verma, D.5
-
6
-
-
29744452906
-
-
Tech. Rep. UCB/CSD-03-1279, EECS Department, University of California, Berkeley
-
El Ghaoui L, Lanckriet GRG, Natsoulis G (2003) Robust classification with interval data. Tech. Rep. UCB/CSD-03-1279, EECS Department, University of California, Berkeley
-
(2003)
Robust Classification with Interval Data
-
-
El Ghaoui, L.1
Grg, L.2
Natsoulis, G.3
-
7
-
-
0013113240
-
Adaptive fraud detection
-
10.1023/A:1009700419189
-
T Fawcett FJ Provost 1997 Adaptive fraud detection Data Min Knowl Discov 1 3 291 316 10.1023/A:1009700419189
-
(1997)
Data Min Knowl Discov
, vol.1
, Issue.3
, pp. 291-316
-
-
Fawcett, T.1
Provost, F.J.2
-
9
-
-
33749242256
-
Nightmare at test time: Robust learning by feature deletion
-
Pittsburgh, PA, June 25-June 29
-
Globerson A, Roweis S (2006) Nightmare at test time: robust learning by feature deletion. In: Proceedings of the 23rd international conference on machine learning, Pittsburgh, PA, June 25-June 29, pp 353-360
-
(2006)
Proceedings of the 23rd International Conference on Machine Learning
, pp. 353-360
-
-
Globerson, A.1
Roweis, S.2
-
10
-
-
0035789299
-
Mining time-changing data streams
-
San Francisco, CA, August 26-August 29
-
Hulten G, Spencer L, Domingos P (2001) Mining time-changing data streams. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining, San Francisco, CA, August 26-August 29, pp 97-106
-
(2001)
Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 97-106
-
-
Hulten, G.1
Spencer, L.2
Domingos, P.3
-
11
-
-
0042967740
-
A robust minimax approach to classification
-
1084.68657 10.1162/153244303321897726 1991086
-
GR Lanckriet LE Ghaoui C Bhattacharyya MI Jordan 2003 A robust minimax approach to classification J Mach Learn Res 3 555 582 1084.68657 10.1162/153244303321897726 1991086
-
(2003)
J Mach Learn Res
, vol.3
, pp. 555-582
-
-
Lanckriet, G.R.1
Ghaoui, L.E.2
Bhattacharyya, C.3
Jordan, M.I.4
-
12
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Hilton Head, South Carolina, January 25-January 27
-
Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall KR, McClung D, Weber D, Webster SE, Wyschogrod D, Cunningham RK, Zissman MA (2000) Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of the 2000 DARPA information survivability conference and exposition, Hilton Head, South Carolina, January 25-January 27, pp 12-26
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
13
-
-
32344435632
-
Adversarial learning
-
Chicago, IL, August 21-August 24
-
Lowd D, Meek C (2005a) Adversarial learning. In: Proceeding of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining, Chicago, IL, August 21-August 24, pp 641-647
-
(2005)
Proceeding of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining
, pp. 641-647
-
-
Lowd, D.1
Meek, C.2
-
14
-
-
65449142381
-
Good word attacks on statistical spam filters
-
Palo Alto, CA, July 21-July 22
-
Lowd D, Meek C (2005b) Good word attacks on statistical spam filters. In: Proceedings of the 2nd conference on email and anti-spam, Palo Alto, CA, July 21-July 22, pp 1-8
-
(2005)
Proceedings of the 2nd Conference on Email and Anti-spam
, pp. 1-8
-
-
Lowd, D.1
Meek, C.2
-
15
-
-
0242456801
-
Learning nonstationary models of normal network traffic for detecting novel attacks
-
Edmonton, Alberta, Canada, July 23-July 26
-
Mahoney MV, Chan PK (2002) Learning nonstationary models of normal network traffic for detecting novel attacks. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining, Edmonton, Alberta, Canada, July 23-July 26, pp 376-385
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 376-385
-
-
Mahoney, M.V.1
Chan, P.K.2
-
17
-
-
0001345363
-
Convergence and finite-time behavior of simulated annealing
-
0604.60067 10.2307/1427186 857328
-
D Mitra F Romeo A Sangiovanni-Vincentelli 1986 Convergence and finite-time behavior of simulated annealing Adv Appl Probab 18 3 747 771 0604.60067 10.2307/1427186 857328
-
(1986)
Adv Appl Probab
, vol.18
, Issue.3
, pp. 747-771
-
-
Mitra, D.1
Romeo, F.2
Sangiovanni-Vincentelli, A.3
-
19
-
-
84904808498
-
Observed trends in spam construction techniques: A case study of spam evolution
-
Mountain View, California, July 27-July 28
-
Pu C, Webb S (2006) Observed trends in spam construction techniques: A case study of spam evolution. In: Proceedings of the 3rd conference on email and anti-spam, Mountain View, California, July 27-July 28, pp 1-9
-
(2006)
Proceedings of the 3rd Conference on Email and Anti-spam
, pp. 1-9
-
-
Pu, C.1
Webb, S.2
-
21
-
-
85084162557
-
Towards systematic evaluation of the evadability of bot/botnet detection methods
-
San Jose, CA, July 28-August 1
-
Stinson E, Mitchell JC (2008) Towards systematic evaluation of the evadability of bot/botnet detection methods. In: Proceedings of the 2nd conference on USENIX workshop on offensive technologies, San Jose, CA, July 28-August 1, pp 1-9
-
(2008)
Proceedings of the 2nd Conference on USENIX Workshop on Offensive Technologies
, pp. 1-9
-
-
Stinson, E.1
Mitchell, J.C.2
-
22
-
-
85162055491
-
Convex learning with invariances
-
J. Platt D. Koller Y. Singer S. Roweis (eds). MIT Press Cambridge, MA
-
Teo CH, Globerson A, Roweis S, Smola A (2008) Convex learning with invariances. In: Platt J, Koller D, Singer Y, Roweis S (eds) Advances in neural information processing systems, 20. MIT Press, Cambridge, MA, pp 1489-1496
-
(2008)
Advances in Neural Information Processing Systems, 20
, pp. 1489-1496
-
-
Teo, C.H.1
Globerson, A.2
Roweis, S.3
Smola, A.4
-
23
-
-
0013116366
-
Off-line computation of stackelberg solutions with the genetic algorithm
-
0940.91018 10.1023/A:1008652106422
-
T Vallee T Basar 1999 Off-line computation of stackelberg solutions with the genetic algorithm J Comput Econ 13 3 201 209 0940.91018 10.1023/A: 1008652106422
-
(1999)
J Comput Econ
, vol.13
, Issue.3
, pp. 201-209
-
-
Vallee, T.1
Basar, T.2
|