-
1
-
-
24044435942
-
Reducing multiclass to binary: A unifying approach for margin classifiers
-
Allwein E.L.; Schapire R.E.; Singer Y.; and Kaelbling P. Reducing multiclass to binary: a unifying approach for margin classifiers Journal of Machine Learning Research 1 2000 113 141 (Pubitemid 33738778)
-
(2001)
Journal of Machine Learning Research
, vol.1
, Issue.2
, pp. 113-141
-
-
Allwein, E.L.1
Schapire, R.E.2
Singer, Y.3
-
2
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Gold Coast, Australia, September Springer
-
Bailey M.; Oberbeide J.; Andersen J.; Mao Z.M.; Jahanian F.; and Nazario J. Automated classification and analysis of internet malware The 10th Symposium on Recent Advances in Intrusion Detection (RAID'07) Gold Coast, Australia, September 2007 Springer 178 197
-
(2007)
The 10th Symposium on Recent Advances in Intrusion Detection (RAID'07)
, pp. 178-197
-
-
Bailey, M.1
Oberbeide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
3
-
-
84861098789
-
-
June Technical Report. Department of Computer Science, School of Engineering and Applied Science, Washington DC
-
Boney, D.G.; 1999, June. The Plague: An Army of Software Agents for Information Warfare. Technical Report. Department of Computer Science, School of Engineering and Applied Science, Washington DC.
-
(1999)
The Plague: An Army of Software Agents for Information Warfare
-
-
Boney, D.G.1
-
5
-
-
0026966646
-
A training algorithm for optimal margin classifiers
-
Pittsburgh, PA, USA, July ACM Press
-
Boser B.E.; Guyon I.M.; and Vapnik V.N. A training algorithm for optimal margin classifiers Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory Pittsburgh, PA, USA, July 1992 ACM Press 144 152
-
(1992)
Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory
, pp. 144-152
-
-
Boser, B.E.1
Guyon, I.M.2
Vapnik, V.N.3
-
7
-
-
33746911072
-
From antivirus to antimalware software and beyond: Another approach to the protection of customers from dysfunctional system behaviour
-
Arlington, VA, USA, October NIST
-
Brunnstein K. From antivirus to antimalware software and beyond: another approach to the protection of customers from dysfunctional system behaviour Proceedings of the 22nd National Information System Security Conference Arlington, VA, USA, October 1999 NIST 1 14
-
(1999)
Proceedings of the 22nd National Information System Security Conference
, pp. 1-14
-
-
Brunnstein, K.1
-
9
-
-
0000913324
-
SVMTorch: Support Vector Machines for large-scale regression problems
-
Collobert R.; and Bengio S. SVMtorch: support vector machines for large-scale regression problems Journal of Machine Learning Research (JMLR) 1 2001 143 160 (Pubitemid 33738779)
-
(2001)
Journal of Machine Learning Research
, vol.1
, Issue.2
, pp. 143-160
-
-
Collobert, R.1
Bengio, S.2
-
10
-
-
33845391802
-
Vigilante: End-to-end containment of Internet worms
-
DOI 10.1145/1095809.1095824
-
Costa M.; Crowcroft J.; Castro M.; Rowstron A.; Zhou L.; Zhang L.; and Barham P. Vigilante: end-to-end containment of internet worms Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP2005) Brighton, United Kingdom, October 2005 ACM New York, NY, USA 133 147 (Pubitemid 44892209)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
11
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious Javascript code
-
Raleigh, NC, USA, April ACM
-
Cova M.; Kruegel C.; and Vigna G. Detection and analysis of drive-by-download attacks and malicious Javascript code Proceedings of the World Wide Web Conference Raleigh, NC, USA, April 2010 ACM 1 10
-
(2010)
Proceedings of the World Wide Web Conference
, pp. 1-10
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
12
-
-
0010442827
-
On the algorithmic implementation of multiclass kernel-based vector machines
-
DECEMBER
-
Crammer K.; and Singer Y. On the algorithmic implementation of multiclass kernel-based vector machines Journal of Machine Learning Research 2 December 2001 265 292
-
(2001)
Journal of Machine Learning Research
, vol.2
, pp. 265-292
-
-
Crammer, K.1
Singer, Y.2
-
14
-
-
0000406788
-
Solving multiclass learning problems via error-correcting output codes
-
JANUARY
-
Dietterich T.G.; and Bakiri G. Solving multiclass learning problems via error-correcting output codes Journal of Artificial Intelligence Research 2 January 1995 263 286
-
(1995)
Journal of Artificial Intelligence Research
, vol.2
, pp. 263-286
-
-
Dietterich, T.G.1
Bakiri, G.2
-
15
-
-
0041657519
-
Interior-point methods for massive support vector machines
-
DOI 10.1137/S1052623400374379, PII S1052623400374379
-
Ferris M.; and Munson T. Interior-point methods for massive support vector machines SIAM Journal of Optimization 13 3 2003 783 804 (Pubitemid 36971112)
-
(2003)
SIAM Journal on Optimization
, vol.13
, Issue.3
, pp. 783-804
-
-
Ferris, M.C.1
Munson, T.S.2
-
16
-
-
2942731012
-
An extensive empirical study of feature selection metrics for text classification
-
Forman G. An extensive empirical study of feature selection metrics for text classification Journal of Machine Learning Research 3 2003 1289 1305
-
(2003)
Journal of Machine Learning Research
, vol.3
, pp. 1289-1305
-
-
Forman, G.1
-
18
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
Oaklan, CA, USA, May IEEE
-
Fredrikson M.; Jha S.; Christodorescu M.; Sailer R.; and Yan X. Synthesizing near-optimal malware specifications from suspicious behaviors 2010 IEEE Symposium on Security and Privacy Oaklan, CA, USA, May 2010 IEEE 45 60
-
(2010)
2010 IEEE Symposium on Security and Privacy
, pp. 45-60
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
19
-
-
0035470889
-
Greedy function approximation: A gradient boosting machine
-
Friedman J.H. Greedy function approximation: a gradient boosting machine Annals of Statistics 29 1999 1189 1232 (Pubitemid 33405972)
-
(2001)
Annals of Statistics
, vol.29
, Issue.5
, pp. 1189-1232
-
-
Friedman, J.H.1
-
21
-
-
84861096611
-
A system to support the analysis of antivirus products' virus detection capabilities
-
ISBN 951-44-5370-0
-
Helenius M. A system to support the analysis of antivirus products' virus detection capabilities Tampereen Yliopisto 2002 ISBN 951-44-5370-0
-
(2002)
Tampereen Yliopisto
-
-
Helenius, M.1
-
23
-
-
0002714543
-
Making large-scale support vector machine learning practical
-
Schoelkopf B. Burges C. Smola A. MIT Press Cambridge, MA (Chapter 11)
-
Joachims T. Making large-scale support vector machine learning practical Schoelkopf B. Burges C. Smola A. Advances in Kernel Methods - Support Vector Learning 1999 MIT Press Cambridge, MA 169 184 (Chapter 11)
-
(1999)
Advances in Kernel Methods - Support Vector Learning
, pp. 169-184
-
-
Joachims, T.1
-
25
-
-
21844461582
-
A modified finite newton method for fast solution of large scale linear SVMs
-
Keerthi S.; and DeCoste D. A modified finite newton method for fast solution of large scale linear SVMs Journal of Machine Learning Research (JMLR) 6 2005 341 361
-
(2005)
Journal of Machine Learning Research (JMLR)
, vol.6
, pp. 341-361
-
-
Keerthi, S.1
Decoste, D.2
-
30
-
-
38149001240
-
Behavioral classification
-
Hamburg, Germany, April/May European Expert Group for IT Security
-
Lee T.; and Mody J. Behavioral classification Proceedings of the EICAR Conference Hamburg, Germany, April/May 2006 European Expert Group for IT Security 1 17
-
(2006)
Proceedings of the EICAR Conference
, pp. 1-17
-
-
Lee, T.1
Mody, J.2
-
31
-
-
0012879285
-
-
Technical Report. Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden
-
Lindqvist, U, 1999. On the Fundamentals of Analysis and Detection of Computer Misuse. Technical Report. Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden.
-
(1999)
On the Fundamentals of Analysis and Detection of Computer Misuse
-
-
Lindqvist, U.1
-
32
-
-
0030676601
-
How to systematically classify computer security intrusions
-
Oakland, CA, November IEEE Computer Society Press
-
Lindqvist U.; and Jonsson E. How to systematically classify computer security intrusions Proceedings of the 1997 IEEE Symposium on Security & Privacy Oakland, CA, November 1997 IEEE Computer Society Press 154 163
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security & Privacy
, pp. 154-163
-
-
Lindqvist, U.1
Jonsson, E.2
-
35
-
-
85084162258
-
How to own the internet in your spare time
-
San Francisco, CA, USA, August
-
Paxson V.; Staniford S.; and Weaver N. How to own the internet in your spare time Proceedings of the 11th USENIX Security Symposium (Security'02) San Francisco, CA, USA, August 2002 1 19
-
(2002)
Proceedings of the 11th USENIX Security Symposium (Security'02)
, pp. 1-19
-
-
Paxson, V.1
Staniford, S.2
Weaver, N.3
-
37
-
-
84948481845
-
An algorithm for suffix stripping
-
Porter M.F. An algorithm for suffix stripping Program 14 3 1980 130 137
-
(1980)
Program
, vol.14
, Issue.3
, pp. 130-137
-
-
Porter, M.F.1
-
38
-
-
49949090311
-
Learning and classification of malware behavior
-
Paris, France, July Springer
-
Rieck K.; Holz T.; Willems C.; Dussel P.; and Laskov P. Learning and classification of malware behavior The 5th International Conference on Detection of Intrusion Detections and Malware, and Vulnerability Assessment (DIMVA'08) Paris, France, July 2008 Springer 108 125
-
(2008)
The 5th International Conference on Detection of Intrusion Detections and Malware, and Vulnerability Assessment (DIMVA'08)
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Dussel, P.4
Laskov, P.5
-
39
-
-
45549117987
-
Term-weighting approaches in automatic text retrieval
-
Salton G.; and Buckley C. Term-weighting approaches in automatic text retrieval Information Processing and Management 24 5 1988 513 523
-
(1988)
Information Processing and Management
, vol.24
, Issue.5
, pp. 513-523
-
-
Salton, G.1
Buckley, C.2
-
43
-
-
30344459996
-
Countering network worms through automatic patch generation
-
DOI 10.1109/MSP.2005.144
-
Sidiroglou S.; and Keromytis A.D. Countering network worms through automatic patch generation Security & Privacy 3 November-December (6) 2005 41 49 (Pubitemid 43060393)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.6
, pp. 41-49
-
-
Sidiroglou, S.1
Keromytis, A.D.2
-
54
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
DOI 10.1109/MSP.2007.45
-
Willems C.; Holz T.; and Freiling F. CWSandbox: towards automated dynamic binary analysis Security and Privacy 5 March-April (2) 2007 32 39 (Pubitemid 46527386)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, G.1
Holz, T.2
Freiling, F.3
|