-
2
-
-
50949133669
-
LIBLINEAR: A library for large linear classification
-
R.E. Fan, K.W. Chang, C.J. Hsieh, X.R. Wang, and C.J. Lin (2008). LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research 9:1871-1874.
-
(2008)
Journal of Machine Learning Research
, vol.9
, pp. 1871-1874
-
-
Fan, R.E.1
Chang, K.W.2
Hsieh, C.J.3
Wang, X.R.4
Lin, C.J.5
-
3
-
-
35348913799
-
Learning to detect phishing emails
-
DOI 10.1145/1242572.1242660, 16th International World Wide Web Conference, WWW2007
-
I. Fette, N. Sadeh, and A. Tomasic (2007). Learning to Detect Phishing Emails. In Proceedings of the Sixteenth International World Wide Web Conference (WWW-07), pages 649-656. Banff, Alberta, Canada. (Pubitemid 47582294)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
5
-
-
84898964201
-
Algorithms for non-negative matrix factorization
-
MIT Press: Cambridge, MA
-
D.D. Lee and H.S. Seung (2001). Algorithms for Non-negative Matrix Factorization. Advances in Neural Information Processing Systems 14, pages 556-562. MIT Press: Cambridge, MA.
-
(2001)
Advances in Neural Information Processing Systems
, vol.14
, pp. 556-562
-
-
Lee, D.D.1
Seung, H.S.2
-
6
-
-
0033592606
-
Learning the parts of objects with nonnegative matrix factorization
-
D.D. Lee and H.S. Seung (1999). Learning the parts of objects with nonnegative matrix factorization. Nature 401: 788-791.
-
(1999)
Nature
, vol.401
, pp. 788-791
-
-
Lee, D.D.1
Seung, H.S.2
-
7
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Oakland, USA
-
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G.M. Voelker, and S. Savage (2011). Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, USA.
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Levchenko, K.1
Pitsillidis, A.2
Chachra, N.3
Enright, B.4
Felegyhazi, M.5
Grier, C.6
Halvorson, T.7
Kanich, C.8
Kreibich, C.9
Liu, H.10
Mccoy, D.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
8
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
D. Lowe (2004). Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, 60(2):91-110.
-
(2004)
International Journal of Computer Vision
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.1
-
9
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious URLs
-
Paris, France
-
J. Ma, L.K. Saul, S. Savage, and G.M. Voelker (2009). Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs. In Proceedings of the Fifthteenth ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD-09), pages 1245-1253. Paris, France.
-
(2009)
Proceedings of the Fifthteenth ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD-09)
, pp. 1245-1253
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
10
-
-
71149108237
-
Identifying suspicious URLs: An application of large-scale online learning
-
Montreal, Canada
-
J. Ma, L.K. Saul, S. Savage, and G.M. Voelker (2009). Identifying Suspicious URLs: An Application of Large-Scale Online Learning. In Proceedings of the Twenty Sixth International Conference on Machine Learning (ICML-09), pages 681-688. Montreal, Canada.
-
(2009)
Proceedings of the Twenty Sixth International Conference on Machine Learning (ICML-09)
, pp. 681-688
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
12
-
-
0035328421
-
Modeling the shape of the scene: A holistic representation of the spatial envelope
-
DOI 10.1023/A:1011139631724
-
A. Oliva and A. Torralba (2001). Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope. International Journal of Computer Vision 42(3): 145-175. (Pubitemid 32680801)
-
(2001)
International Journal of Computer Vision
, vol.42
, Issue.3
, pp. 145-175
-
-
Oliva, A.1
Torralba, A.2
-
13
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
Cambridge, MA
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu (2007). The Ghost in the Browser Analysis of Web-based Malware. In Proceedings of the USENIX Workshop on Hot Topics in Understanding Botnets (HotBots). Cambridge, MA.
-
(2007)
Proceedings of the USENIX Workshop on Hot Topics in Understanding Botnets (HotBots)
-
-
Provos, N.1
Mcnamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
15
-
-
80051985554
-
Design and evaluation of a real-time URL spam filtering service
-
Oakland, CA
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song (2011). Design and Evaluation of a Real-Time URL Spam Filtering Service. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA.
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
16
-
-
84904088330
-
Automated web patrol with strider HoneyMonkeys: Finding web sites that exploit browser vulnerabilities
-
San Diego, CA
-
Y.M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King (2006). Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In Proceedings of the Thirteenth Annual Symposium on Network and Distributed System Security (NDSS-06). San Diego, CA.
-
(2006)
Proceedings of the Thirteenth Annual Symposium on Network and Distributed System Security (NDSS-06)
-
-
Wang, Y.M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
17
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
DOI 10.1145/1242572.1242659, 16th International World Wide Web Conference, WWW2007
-
Y. Zhang, J. Hong, and L. Cranor (2007). CANTINA: A Content-Based Approach to Detecting Phishing Web Sites. In Proceedings of the Sixteenth International World Wide Web Conference (WWW-07), pages 639-648. Banff, Alberta, Canada. (Pubitemid 47582293)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
|