-
1
-
-
33644641221
-
On the combination of evolutionary algorithms and stratified strategies for training set selection in data mining
-
Cano, J., Herrera, F., and Lozano, M. (2006). On the combination of evolutionary algorithms and stratified strategies for training set selection in data mining. Applied Soft Computing Journal, 6(3):323-332.
-
(2006)
Applied Soft Computing Journal
, vol.6
, Issue.3
, pp. 323-332
-
-
Cano, J.1
Herrera, F.2
Lozano, M.3
-
3
-
-
47249140957
-
Instance reduction approach to machine learning and multi-database mining
-
Czarnowski, I. and Jedrzejowicz, P. (2006). Instance reduction approach to machine learning and multi-database mining. In Proceedings of the Scientific Session organized during XXI Fall Meeting of the Polish Information Processing Society, Informatica, ANNALES Universitatis Mariae Curie-Sklodowska, Lublin, pages 60-71.
-
(2006)
Proceedings of the Scientific Session Organized during XXI Fall Meeting of the Polish Information Processing Society, Informatica, ANNALES Universitatis Mariae Curie-Sklodowska, Lublin
, pp. 60-71
-
-
Czarnowski, I.1
Jedrzejowicz, P.2
-
7
-
-
70349448915
-
Renovo: A hidden code extractor for packed executables
-
Kang, M., Poosankam, P., and Yin, H. (2007). Renovo: A hidden code extractor for packed executables. In Proceedings of the 2007 ACM workshop on Recurring malcode, pages 46-53.
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode
, pp. 46-53
-
-
Kang, M.1
Poosankam, P.2
Yin, H.3
-
15
-
-
79958242266
-
Collective classification for text classification
-
Namata, G., Sen, P., Bilgic,M., and Getoor, L. (2009). Collective classification for text classification. Text Mining, pages 51-69.
-
(2009)
Text Mining
, pp. 51-69
-
-
Namata, G.1
Sen, P.2
Bilgic, M.3
Getoor, L.4
-
19
-
-
80052977357
-
Semisupervised learning for unknown malware detection
-
Abraham, A., Corchado, J., Gonzlez, S., and De Paz Santana, J., editors, Advances in Intelligent and Soft Computing,Springer Berlin / Heidelberg
-
Santos, I., Nieves, J., and Bringas, P. (2011). Semisupervised learning for unknown malware detection. In Abraham, A., Corchado, J., Gonzlez, S., and De Paz Santana, J., editors, International Symposium on Distributed Computing and Artificial Intelligence, volume 91 of Advances in Intelligent and Soft Computing, pages 415-422. Springer Berlin / Heidelberg.
-
(2011)
International Symposium on Distributed Computing and Artificial Intelligence
, vol.91
, pp. 415-422
-
-
Santos, I.1
Nieves, J.2
Bringas, P.3
-
21
-
-
0037806811
-
The boosting approach to machine learning: An overview
-
Schapire, R. (2003). The boosting approach to machine learning: An overview. Lecture Notes in Statistics, pages 149-172.
-
(2003)
Lecture Notes in Statistics
, pp. 149-172
-
-
Schapire, R.1
-
22
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Schultz, M., Eskin, E., Zadok, F., and Stolfo, S. (2001). Data mining methods for detection of new malicious executables. In Proceedings of the 22nd IEEE Symposium on Security and Privacy., pages 38-49.
-
(2001)
nd IEEE Symposium on Security and Privacy.
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, F.3
Stolfo, S.4
-
23
-
-
49949094798
-
Embedded malware detection using markov n-grams
-
Shafiq, M., Khayam, S., and Farooq, M. (2008). Embedded Malware Detection Using Markov n-Grams. Lecture Notes in Computer Science, 5137:88-107.
-
(2008)
Lecture Notes in Computer Science
, vol.5137
, pp. 88-107
-
-
Shafiq, M.1
Khayam, S.2
Farooq, M.3
-
24
-
-
57049186367
-
Eureka: A framework for enabling static malware analysis
-
Sharif, M., Yegneswaran, V., Saidi, H., Porras, P., and Lee, W. (2008). Eureka: A Framework for Enabling Static Malware Analysis. In Proceedings of the European Symposium on Research in Computer Security (ESORICS), pages 481-500.
-
(2008)
Proceedings of the European Symposium on Research in Computer Security (ESORICS)
, pp. 481-500
-
-
Sharif, M.1
Yegneswaran, V.2
Saidi, H.3
Porras, P.4
Lee, W.5
-
25
-
-
67650330214
-
Comparative analysis of regression and machine learning methods for predicting fault proneness models
-
Singh, Y., Kaur, A., and Malhotra, R. (2009). Comparative analysis of regression and machine learning methods for predicting fault proneness models. International Journal of Computer Applications in Technology, 35(2):183-193.
-
(2009)
International Journal of Computer Applications in Technology
, vol.35
, Issue.2
, pp. 183-193
-
-
Singh, Y.1
Kaur, A.2
Malhotra, R.3
-
26
-
-
0037387684
-
OFFSS: Optimal fuzzy-valued feature subset selection
-
Tsang, E., Yeung, D., and Wang, X. (2003). OFFSS: optimal fuzzy-valued feature subset selection. IEEE transactions on fuzzy systems, 11(2):202-213.
-
(2003)
IEEE Transactions on Fuzzy Systems
, vol.11
, Issue.2
, pp. 202-213
-
-
Tsang, E.1
Yeung, D.2
Wang, X.3
-
27
-
-
70349232273
-
Malware detection using adaptive data compression
-
ACM New York, NY, USA
-
Zhou, Y. and Inge, W. (2008). Malware detection using adaptive data compression. In Proceedings of the 1st ACM workshop on Workshop on AISec, pages 53-60. ACM New York, NY, USA.
-
(2008)
Proceedings of the 1st ACM Workshop on Workshop on AISec
, pp. 53-60
-
-
Zhou, Y.1
Inge, W.2
-
28
-
-
48649098207
-
Combating good word attacks on statistical spam filters with multiple instance learning
-
Zhou, Y., Jorgensen, Z., and Inge, M. (2007). Combating Good Word Attacks on Statistical Spam Filters with Multiple Instance Learning. In Proceedings of the 19th IEEE International Conference on Tools with Artificial Intelligence-Volume 02, pages 298-305.
-
(2007)
th IEEE International Conference on Tools with Artificial Intelligence
, vol.2
, pp. 298-305
-
-
Zhou, Y.1
Jorgensen, Z.2
Inge, M.3
|