-
1
-
-
0032786569
-
Improving support vector machine classifiers by modifying kernel functions
-
S. Amari, and S. Wu Improving support vector machine classifiers by modifying kernel functions Neural Networks 12 1999 783 789
-
(1999)
Neural Networks
, vol.12
, pp. 783-789
-
-
Amari, S.1
Wu, S.2
-
2
-
-
0001185873
-
An essay towards solving a problem in the doctrine of chances
-
T. Bayes An essay towards solving a problem in the doctrine of chances Philosophical Transactions of the Royal Society 53 1763 370 418
-
(1763)
Philosophical Transactions of the Royal Society
, vol.53
, pp. 370-418
-
-
Bayes, T.1
-
3
-
-
84860833874
-
Static analysis of binary code to isolate malicious behaviors
-
J. Bergeron, M. Debbabi, M. Erhioui, B. Ktari, Static analysis of binary code to isolate malicious behaviors, in: Proceedings of the 1999 Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises, 1999, pp. 184-189.
-
(1999)
Proceedings of the 1999 Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
, pp. 184-189
-
-
Bergeron, J.1
Debbabi, M.2
Erhioui, M.3
Ktari, B.4
-
6
-
-
0031334221
-
Selection of relevant features and examples in machine learning
-
A. Blum, and P. Langley Selection of relevant features and examples in machine learning Artificial Intelligence 97 1997 245 271
-
(1997)
Artificial Intelligence
, vol.97
, pp. 245-271
-
-
Blum, A.1
Langley, P.2
-
9
-
-
27544499740
-
Detecting a malicious executable without prior knowledge of its patterns
-
D. Cai, J. Theiler, M. Gokhale, Detecting a malicious executable without prior knowledge of its patterns, in: Proceedings of the 2005 Defense and Security Symposium. Information Assurance, and Data Network Security, vol. 5812, 2005, pp. 1-12.
-
(2005)
Proceedings of the 2005 Defense and Security Symposium. Information Assurance, and Data Network Security
, vol.5812
, pp. 1-12
-
-
Cai, D.1
Theiler, J.2
Gokhale, M.3
-
10
-
-
33644641221
-
On the combination of evolutionary algorithms and stratified strategies for training set selection in data mining
-
J. Cano, F. Herrera, and M. Lozano On the combination of evolutionary algorithms and stratified strategies for training set selection in data mining Applied Soft Computing Journal 6 2006 323 332
-
(2006)
Applied Soft Computing Journal
, vol.6
, pp. 323-332
-
-
Cano, J.1
Herrera, F.2
Lozano, M.3
-
17
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, R. Bryant, Semantics-aware malware detection, in: Proceedings of the 2005 IEEE Symposium on Security and Privacy, 2005, pp. 32-46.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
19
-
-
47249140957
-
Instance reduction approach to machine learning and multi-database mining
-
I. Czarnowski, P. Jedrzejowicz, Instance reduction approach to machine learning and multi-database mining, in: Proceedings of the 2006 Scientific Session organized during XXI Fall Meeting of the Polish Information Processing Society, Informatica, ANNALES Universitatis Mariae Curie-Skłodowska, Lublin, 2006, pp. 60-71.
-
(2006)
Proceedings of the 2006 Scientific Session Organized during XXI Fall Meeting of the Polish Information Processing Society, Informatica, ANNALES Universitatis Mariae Curie-Skłodowska, Lublin
, pp. 60-71
-
-
Czarnowski, I.1
Jedrzejowicz, P.2
-
20
-
-
0242302657
-
Consistency-based search in feature selection
-
M. Dash, and H. Liu Consistency-based search in feature selection Artificial Intelligence 151 2003 155 176
-
(2003)
Artificial Intelligence
, vol.151
, pp. 155-176
-
-
Dash, M.1
Liu, H.2
-
23
-
-
77950036364
-
On the versatility of radial basis function neural networks: A case study in the field of intrusion detection
-
D. Fisch, A. Hofmann, and B. Sick On the versatility of radial basis function neural networks: a case study in the field of intrusion detection Information Sciences 180 2010 2421 2439
-
(2010)
Information Sciences
, vol.180
, pp. 2421-2439
-
-
Fisch, D.1
Hofmann, A.2
Sick, B.3
-
26
-
-
0031276011
-
Bayesian network classifiers
-
D. Geiger, M. Goldszmidt, G. Provan, P. Langley, P. Smyth, Bayesian network classifiers, in: Machine Learning 29 (1997) 131-163.
-
(1997)
Machine Learning
, vol.29
, pp. 131-163
-
-
Geiger, D.1
Goldszmidt, M.2
Provan, G.3
Langley, P.4
Smyth, P.5
-
27
-
-
84874112702
-
Shielding wireless sensor network using markovian intrusion detection system with attack pattern mining
-
J. Huang, and I. Liao Shielding wireless sensor network using markovian intrusion detection system with attack pattern mining Information Sciences 2011
-
(2011)
Information Sciences
-
-
Huang, J.1
Liao, I.2
-
28
-
-
56549084673
-
A survey of malware detection techniques
-
Department of Computer Science, Purdue University
-
N. Idika, A. Mathur, A survey of malware detection techniques, Technical Report, Department of Computer Science, Purdue University, 2007.
-
(2007)
Technical Report
-
-
Idika, N.1
Mathur, A.2
-
29
-
-
48349134267
-
Behavioral detection of malware: From a survey towards an established taxonomy
-
G. Jacob, H. Debar, and E. Filiol Behavioral detection of malware: from a survey towards an established taxonomy Journal in Computer Virology 4 2008 251 266
-
(2008)
Journal in Computer Virology
, vol.4
, pp. 251-266
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
30
-
-
33745771538
-
Machine learning techniques and chi-square feature selection for cancer classification using SAGE gene expression profiles
-
X. Jin, A. Xu, R. Bie, and P. Guo Machine learning techniques and chi-square feature selection for cancer classification using SAGE gene expression profiles Lecture Notes in Computer Science 3916 2006 106 115
-
(2006)
Lecture Notes in Computer Science
, vol.3916
, pp. 106-115
-
-
Jin, X.1
Xu, A.2
Bie, R.3
Guo, P.4
-
32
-
-
70349448915
-
Renovo: A hidden code extractor for packed executables
-
M. Kang, P. Poosankam, H. Yin, Renovo: a hidden code extractor for packed executables, in: Proceedings of the 2007 ACM workshop on Recurring Malcode, 2007, pp. 46-53.
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode
, pp. 46-53
-
-
Kang, M.1
Poosankam, P.2
Yin, H.3
-
34
-
-
0001600762
-
Information gain and a general measure of correlation
-
J. Kent Information gain and a general measure of correlation Biometrika 70 1983 163
-
(1983)
Biometrika
, vol.70
, pp. 163
-
-
Kent, J.1
-
37
-
-
79955076643
-
Supervised machine learning: A review of classification techniques
-
S. Kotsiantis, Supervised machine learning: a review of classification techniques, in: Proceeding of the 2007 Conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, 2007, pp. 3-24.
-
(2007)
Proceeding of the 2007 Conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in EHealth, HCI, Information Retrieval and Pervasive Technologies
, pp. 3-24
-
-
Kotsiantis, S.1
-
39
-
-
56949107719
-
Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection
-
G. Kou, Y. Peng, Z. Chen, and Y. Shi Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection Information Sciences 179 2009 371 381
-
(2009)
Information Sciences
, vol.179
, pp. 371-381
-
-
Kou, G.1
Peng, Y.2
Chen, Z.3
Shi, Y.4
-
41
-
-
84957069091
-
Naive (Bayes) at forty: The independence assumption in information retrieval
-
D. Lewis Naive (Bayes) at forty: the independence assumption in information retrieval Lecture Notes in Computer Science 1398 1998 4 18
-
(1998)
Lecture Notes in Computer Science
, vol.1398
, pp. 4-18
-
-
Lewis, D.1
-
42
-
-
33745456200
-
Fileprints: Identifying file types by n-gram analysis
-
W. Li, K. Wang, S. Stolfo, B. Herzog, Fileprints: identifying file types by n-gram analysis, in: Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, 2005.
-
(2005)
Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
-
-
Li, W.1
Wang, K.2
Stolfo, S.3
Herzog, B.4
-
46
-
-
0025798330
-
A distance-based attribute selection measure for decision tree induction
-
R. Mántaras A distance-based attribute selection measure for decision tree induction Machine Learning 6 1991 81 92
-
(1991)
Machine Learning
, vol.6
, pp. 81-92
-
-
Mántaras, R.1
-
47
-
-
48649084773
-
Omniunpack: Fast, generic, and safe unpacking of malware
-
L. Martignoni, M. Christodorescu, S. Jha, Omniunpack: fast, generic, and safe unpacking of malware, in: Proceedings of the 2007 Annual Computer Security Applications Conference (ACSAC), 2007, pp. 431-441.
-
(2007)
Proceedings of the 2007 Annual Computer Security Applications Conference (ACSAC)
, pp. 431-441
-
-
Martignoni, L.1
Christodorescu, M.2
Jha, S.3
-
50
-
-
51849107341
-
Unknown malcode detection via text categorization and the imbalance problem
-
R. Moskovitch, D. Stopel, C. Feher, N. Nissim, Y. Elovici, Unknown malcode detection via text categorization and the imbalance problem, in: Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics (ISI), 2008, pp. 156-161.
-
(2008)
Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics (ISI)
, pp. 156-161
-
-
Moskovitch, R.1
Stopel, D.2
Feher, C.3
Nissim, N.4
Elovici, Y.5
-
51
-
-
52149092178
-
The evolution of commercial malware development kits and colour-by-numbers custom malware
-
G. Ollmann The evolution of commercial malware development kits and colour-by-numbers custom malware Computer Fraud and Security 2008 2008 4 7
-
(2008)
Computer Fraud and Security
, vol.2008
, pp. 4-7
-
-
Ollmann, G.1
-
53
-
-
24344458137
-
Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy
-
H. Peng, F. Long, and C. Ding Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy IEEE Transactions on Pattern Analysis and Machine Intelligence 2005 1226 1238
-
(2005)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, pp. 1226-1238
-
-
Peng, H.1
Long, F.2
Ding, C.3
-
54
-
-
50149118846
-
Classification of packed executables for accurate computer virus detection
-
R. Perdisci, A. Lanzi, and W. Lee Classification of packed executables for accurate computer virus detection Pattern Recognition Letters 29 2008 1941 1946
-
(2008)
Pattern Recognition Letters
, vol.29
, pp. 1941-1946
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
55
-
-
60649088451
-
McBoost: Boosting scalability in malware collection and analysis using statistical classification of executables
-
R. Perdisci, A. Lanzi, W. Lee, McBoost: boosting scalability in malware collection and analysis using statistical classification of executables, in: Proceedings of the 23rd Annual Computer Security Applications Conference, 2008, pp. 301-310.
-
(2008)
Proceedings of the 23rd Annual Computer Security Applications Conference
, pp. 301-310
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
57
-
-
0003120218
-
Sequential minimal optimization: A fast algorithm for training support vector machines
-
J. Platt Sequential minimal optimization: a fast algorithm for training support vector machines Advances in Kernel Methods-Support Vector Learning 208 1999
-
(1999)
Advances in Kernel Methods-Support Vector Learning
, vol.208
-
-
Platt, J.1
-
58
-
-
63449141090
-
The effectiveness of anti-malware tools
-
B. Potter, and G. Day The effectiveness of anti-malware tools Computer Fraud and Security 2009 2009 12 13
-
(2009)
Computer Fraud and Security
, vol.2009
, pp. 12-13
-
-
Potter, B.1
Day, G.2
-
60
-
-
33744584654
-
Induction of decision trees
-
J. Quinlan Induction of decision trees Machine Learning 1 1986 81 106
-
(1986)
Machine Learning
, vol.1
, pp. 81-106
-
-
Quinlan, J.1
-
62
-
-
8844253324
-
Understanding inverse document frequency: On theoretical arguments for IDF
-
S. Robertson Understanding inverse document frequency: on theoretical arguments for IDF Journal of Documentation 60 2004 503 520
-
(2004)
Journal of Documentation
, vol.60
, pp. 503-520
-
-
Robertson, S.1
-
63
-
-
34748820878
-
Polyunpack: Automating the hidden-code extraction of unpack-executing malware
-
P. Royal, M. Halpin, D. Dagon, R. Edmonds, W. Lee, Polyunpack: automating the hidden-code extraction of unpack-executing malware, in: Proceedings of the 2006 Annual Computer Security Applications Conference (ACSAC), 2006, pp. 289-300.
-
(2006)
Proceedings of the 2006 Annual Computer Security Applications Conference (ACSAC)
, pp. 289-300
-
-
Royal, P.1
Halpin, M.2
Dagon, D.3
Edmonds, R.4
Lee, W.5
-
64
-
-
84874115897
-
-
second ed. Artificial Intelligence: A Modern Approach Prentice Hall
-
S.J. Russell Norvig second ed. Artificial Intelligence: A Modern Approach 2003 Prentice Hall
-
(2003)
Norvig
-
-
Russell, S.J.1
-
66
-
-
77949503891
-
Idea: Opcode-sequence-based malware detection
-
LNCS 10.1007/978-3-642-11747-3-3
-
I. Santos, F. Brezo, J. Nieves, Y. Penya, B. Sanz, C. Laorden, and P. Bringas Idea: opcode-sequence-based malware detection Engineering Secure Software and Systems LNCS 5965 2010 35 43 10.1007/978-3-642-11747-3-3
-
(2010)
Engineering Secure Software and Systems
, vol.5965
, pp. 35-43
-
-
Santos, I.1
Brezo, F.2
Nieves, J.3
Penya, Y.4
Sanz, B.5
Laorden, C.6
Bringas, P.7
-
67
-
-
74549138307
-
N-Grams-based file signatures for malware detection
-
I. Santos, Y. Penya, J. Devesa, P. Bringas, N-Grams-based file signatures for malware detection, in: Proceedings of the 2009 International Conference on Enterprise Information Systems (ICEIS), vol. AIDSS, 2009, pp. 317-320.
-
(2009)
Proceedings of the 2009 International Conference on Enterprise Information Systems (ICEIS), Vol. AIDSS
, pp. 317-320
-
-
Santos, I.1
Penya, Y.2
Devesa, J.3
Bringas, P.4
-
68
-
-
0037806811
-
The boosting approach to machine learning: An overview
-
R. Schapire The boosting approach to machine learning: an overview Lecture Notes in Statistics 2003 149 172
-
(2003)
Lecture Notes in Statistics
, pp. 149-172
-
-
Schapire, R.1
-
69
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
M. Schultz, E. Eskin, F. Zadok, S. Stolfo, Data mining methods for detection of new malicious executables, in: Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001, pp. 38-49.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, F.3
Stolfo, S.4
-
70
-
-
65749099969
-
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
-
A. Shabtai, R. Moskovitch, Y. Elovici, and C. Glezer Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey Information Security Technical Report 14 2009 16 29
-
(2009)
Information Security Technical Report
, vol.14
, pp. 16-29
-
-
Shabtai, A.1
Moskovitch, R.2
Elovici, Y.3
Glezer, C.4
-
72
-
-
57049186367
-
Eureka: A framework for enabling static malware analysis
-
M. Sharif, V. Yegneswaran, H. Saidi, P. Porras, W. Lee, Eureka: a framework for enabling static malware analysis, in: Proceedings of the 2008 European Symposium on Research in Computer Security (ESORICS), 2008, pp. 481-500.
-
(2008)
Proceedings of the 2008 European Symposium on Research in Computer Security (ESORICS)
, pp. 481-500
-
-
Sharif, M.1
Yegneswaran, V.2
Saidi, H.3
Porras, P.4
Lee, W.5
-
74
-
-
21644475665
-
Static analyzer of vicious executables (save)
-
A. Sung, J. Xu, P. Chavez, S. Mukkamala, Static analyzer of vicious executables (save), in: Proceedings of the 2004 Annual Computer Security Applications Conference (ACSAC), 2004, pp. 326-334.
-
(2004)
Proceedings of the 2004 Annual Computer Security Applications Conference (ACSAC)
, pp. 326-334
-
-
Sung, A.1
Xu, J.2
Chavez, P.3
Mukkamala, S.4
-
76
-
-
1942450610
-
Feature extraction by non parametric mutual information maximization
-
K. Torkkola Feature extraction by non parametric mutual information maximization The Journal of Machine Learning Research 3 2003 1415 1438
-
(2003)
The Journal of Machine Learning Research
, vol.3
, pp. 1415-1438
-
-
Torkkola, K.1
-
79
-
-
33644845063
-
Facilitating the application of support vector regression by using a universal Pearson VII function based kernel
-
B. Üstün, W. Melssen, and L. Buydens Facilitating the application of support vector regression by using a universal Pearson VII function based kernel Chemometrics and Intelligent Laboratory Systems 81 2006 29 40
-
(2006)
Chemometrics and Intelligent Laboratory Systems
, vol.81
, pp. 29-40
-
-
Üstün, B.1
Melssen, W.2
Buydens, L.3
-
81
-
-
79952060600
-
Survey on malware detection methods
-
P. Vinod, R. Jaipur, V. Laxmi, M. Gaur, Survey on malware detection methods, in: Hack, 2009.
-
(2009)
Hack
-
-
Vinod, P.1
Jaipur, R.2
Laxmi, V.3
Gaur, M.4
-
82
-
-
28344446955
-
Polymorphic malicious executable scanner by API sequence analysis
-
J. Xu, A. Sung, P. Chavez, S. Mukkamala, Polymorphic malicious executable scanner by API sequence analysis, in: Proceedings of the 2004 International Conference on Hybrid Intelligent Systems, 2004, pp. 378-383.
-
(2004)
Proceedings of the 2004 International Conference on Hybrid Intelligent Systems
, pp. 378-383
-
-
Xu, J.1
Sung, A.2
Chavez, P.3
Mukkamala, S.4
-
83
-
-
3042824043
-
A study of smoothing methods for language models applied to information retrieval
-
C. Zhai, and J. Lafferty A study of smoothing methods for language models applied to information retrieval ACM Transactions on Information Systems 22 2004 179 214
-
(2004)
ACM Transactions on Information Systems
, vol.22
, pp. 179-214
-
-
Zhai, C.1
Lafferty, J.2
-
85
-
-
70349232273
-
Malware detection using adaptive data compression
-
ACM New York, NY, USA
-
Y. Zhou, and W. Inge Malware detection using adaptive data compression Proceedings of the 2008 ACM Workshop on AISec 2008 ACM New York, NY, USA 53 60
-
(2008)
Proceedings of the 2008 ACM Workshop on AISec
, pp. 53-60
-
-
Zhou, Y.1
Inge, W.2
|