-
1
-
-
0002636321
-
N-gram-based text categorization
-
Las Vegas, US.
-
Cavnar, W.B., Trenkle, J.M., "N-gram-based text categorization. ", Proceedings of SDAIR-94, 3rd Annual Symposium on Document Analysis and Information Retrieval, pp. 161-175. Las Vegas, US. 1994.
-
(1994)
Proceedings of SDAIR-94, 3rd Annual Symposium on Document Analysis and Information Retrieval
, pp. 161-175
-
-
Cavnar, W.B.1
Trenkle, J.M.2
-
2
-
-
33845807843
-
Spam filtering using statistical data compression models
-
Bratko, A., Filipic, B., Cormack, G.V., Lynam, T.R., and Zupan, B., "Spam Filtering Using Statistical Data Compression Models." Journal of Machine Learning Research (JMLR), 7, 2006.
-
(2006)
Journal of Machine Learning Research (JMLR)
, vol.7
-
-
Bratko, A.1
Filipic, B.2
Cormack, G.V.3
Lynam, T.R.4
Zupan, B.5
-
3
-
-
29144505434
-
Detecting unknown computer viruses - A new approach
-
Mar/Jun.
-
M. Akira, S. Toshimi, I. Tomonori, and I. Tadashi, "Detecting Unknown Computer Viruses - A New Approach," Journal of the National Institute of Information and Communications Technology, vol. 52, no. 1/2, pp.75-88, Mar/Jun. 2005.
-
(2005)
Journal of the National Institute of Information and Communications Technology
, vol.52
, Issue.1-2
, pp. 75-88
-
-
Akira, M.1
Toshimi, S.2
Tomonori, I.3
Tadashi, I.4
-
4
-
-
77954452803
-
Detecting internet worms using data mining techniques
-
M. Siddiqui, M.C. Wang, and J. Lee, "Detecting Internet Worms Using Data Mining Techniques," Journal of Systemics, Cybernetics and Informatics, vol. 6, no. 6, pp. 48-53, 2008.
-
(2008)
Journal of Systemics, Cybernetics and Informatics
, vol.6
, Issue.6
, pp. 48-53
-
-
Siddiqui, M.1
Wang, M.C.2
Lee, J.3
-
5
-
-
63149120017
-
Using support vector machine to detect unknown computer viruses
-
B.-Y. Zhang, J.-P. Yin, J.-B. Hao, D.-X. Zhang, and S.-L. Wang, "Using Support Vector Machine to Detect Unknown Computer Viruses," International Journal of Computational Intelligence Research, vol.2, no. 1, pp. 100-104, 2006.
-
(2006)
International Journal of Computational Intelligence Research
, vol.2
, Issue.1
, pp. 100-104
-
-
Zhang, B.-Y.1
Yin, J.-P.2
Hao, J.-B.3
Zhang, D.-X.4
Wang, S.-L.5
-
6
-
-
33746864380
-
Detection of new malicious code using N-grams signatures
-
Retrieved June 3, 2009
-
T. Abou-Assaleh, N. Cercone, V. Keselj, and R. Sweidan, "Detection of New Malicious Code Using N-grams Signatures," Proc. of Second Annual Conference on Privacy, Security and Trust, pp. 193-196. 2004. Retrieved June 3, 2009.
-
(2004)
Proc. of Second Annual Conference on Privacy, Security and Trust
, pp. 193-196
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
8
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Kolter, J., Maloof, M., "Learning to Detect and Classify Malicious Executables in the Wild.", Journal of Machine Learning Research 7, 2006.
-
(2006)
Journal of Machine Learning Research
, vol.7
-
-
Kolter, J.1
Maloof, M.2
-
9
-
-
51849107341
-
Unknown malcode detection via text categorization and the imbalance problem
-
Taiwan
-
Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Elovici, Y.: "Unknown Malcode Detection via Text Categorization and the Imbalance Problem.", IEEE Intelligence and Security Informatics (ISI 2008), Taiwan, 2008
-
(2008)
IEEE Intelligence and Security Informatics (ISI 2008)
-
-
Moskovitch, R.1
Stopel, D.2
Feher, C.3
Nissim, N.4
Elovici, Y.5
|