-
1
-
-
84869403967
-
Veto-based malware detection
-
Prague, Czech Republic. IEEE, August
-
R. K. Shahzad and N. Lavesson, Veto-based malware detection, in Proc. of the 7th International Conference on Availability, Reliability, and Security (ARES'12), Prague, Czech Republic. IEEE, August 2012, pp. 47-54.
-
(2012)
Proc. of the 7th International Conference On Availability, Reliability, and Security (ARES'12)
, pp. 47-54
-
-
Shahzad, R.K.1
Lavesson, N.2
-
2
-
-
56549121841
-
A layered architecture for detecting malicious behaviors
-
Cambridge, Massachusetts, USA, LNCS, Springer-Verlag, September
-
L. Martignoni, E. Stinson, M. Fredrikson, S. Jha, and J. C. Mitchell, A layered architecture for detecting malicious behaviors, in Proc. of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID'08), Cambridge, Massachusetts, USA, LNCS, vol. 5230. Springer-Verlag, September 2008, pp. 78-97.
-
(2008)
Proc. of the 11th International Symposium On Recent Advances In Intrusion Detection (RAID'08)
, vol.5230
, pp. 78-97
-
-
Martignoni, L.1
Stinson, E.2
Fredrikson, M.3
Jha, S.4
Mitchell, J.C.5
-
3
-
-
27244454047
-
Empirical study on weighted voting multiple classifiers
-
Bath, UK. Springer-Verlag, August
-
Y. Sun, M. S. Kamel, and A. K. C. Wong, Empirical study on weighted voting multiple classifiers, in Proc. of the 3rd International Conference on Advances in Pattern Recognition and Data Mining (ICAPR'05), Bath, UK. Springer-Verlag, August 2005, pp. 335-344.
-
(2005)
Proc. of the 3rd International Conference On Advances In Pattern Recognition and Data Mining (ICAPR'05)
, pp. 335-344
-
-
Sun, Y.1
Kamel, M.S.2
Wong, A.K.C.3
-
4
-
-
35248829639
-
Data dependence in combining classifiers
-
Guildford, UK, LNCS, Springer-Verlag, June
-
M. S. Kamel and N. M. Wanas, Data dependence in combining classifiers, in Proc. of the 4th International Conference on Multiple Classifier Systems (MCS'03), Guildford, UK, LNCS, vol. 2709. Springer-Verlag, June 2003, pp. 1-14.
-
(2003)
Proc. of the 4th International Conference On Multiple Classifier Systems (MCS'03)
, vol.2709
, pp. 1-14
-
-
Kamel, M.S.1
Wanas, N.M.2
-
5
-
-
0031238275
-
Application of majority voting to pattern recognition: An analysis of its behavior and performance
-
L. Lam and S. Y. Suen, Application of majority voting to pattern recognition: an analysis of its behavior and performance, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, vol. 27, no. 5, pp. 553-568, 1997.
-
(1997)
IEEE Transactions On Systems, Man, and Cybernetics, Part A: Systems and Humans
, vol.27
, Issue.5
, pp. 553-568
-
-
Lam, L.1
Suen, S.Y.2
-
6
-
-
84886931231
-
When majority voting fails: Comparing quality assurance methods for noisy human computation environment
-
Y.-A. Sun and C. R. Dance, When majority voting fails: Comparing quality assurance methods for noisy human computation environment, Computing Research Repository, vol. 1204.3516, 2012.
-
(2012)
Computing Research Repository
, vol.1204
, pp. 3516
-
-
Sun, Y.-A.1
Dance, C.R.2
-
7
-
-
70350707354
-
Improved ensemble learning in fault diagnosis system
-
Baoding, China. IEEE, July
-
C. Ren, J.-F. Yan, and Z.-H. Li, Improved ensemble learning in fault diagnosis system, in Proc. of the 2009 International Conference on Machine Learning and Cybernetics (ICMLC'09), Baoding, China. IEEE, July 2009, pp. 54-60.
-
(2009)
Proc. of the 2009 International Conference On Machine Learning and Cybernetics (ICMLC'09)
, pp. 54-60
-
-
Ren, C.1
Yan, J.-F.2
Li, Z.-H.3
-
11
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Oakland, California, USA. IEEE, May
-
M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo, Data mining methods for detection of new malicious executables, in Proc. of the 2001 IEEE Symposium on Security and Privacy (S&P'01), Oakland, California, USA. IEEE, May 2001, pp. 38-49.
-
(2001)
Proc. of the 2001 IEEE Symposium On Security and Privacy (S&P'01)
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
12
-
-
77952339517
-
Detection of spyware by mining executable files
-
Krakow, Poland. IEEE, February
-
R. K. Shahzad, S. I. Haider, and N. Lavesson, Detection of spyware by mining executable files, in Proc. of the 5th International Conference on Availability, Reliability, and Security (ARES'05), Krakow, Poland. IEEE, February 2010.
-
(2010)
Proc. of the 5th International Conference On Availability, Reliability, and Security (ARES'05)
-
-
Shahzad, R.K.1
Haider, S.I.2
Lavesson, N.3
-
13
-
-
80053996934
-
Detecting scareware by mining variable length instruction sequences
-
Johannesburg, South Africa. IEEE, August
-
R. K. Shahzad and N. Lavesson, Detecting scareware by mining variable length instruction sequences, in Proc. of the 10th Annual Information Security South Africa Conference (ISSA'11), Johannesburg, South Africa. IEEE, August 2011, pp. 1-8.
-
(2011)
Proc. of the 10th Annual Information Security South Africa Conference (ISSA'11)
, pp. 1-8
-
-
Shahzad, R.K.1
Lavesson, N.2
-
14
-
-
24144490154
-
Diversity in multiple classifier systems
-
L. I. Kuncheva, Diversity in multiple classifier systems, Information Fusion, vol. 6, no. 1, pp. 3-4, 2005.
-
(2005)
Information Fusion
, vol.6
, Issue.1
, pp. 3-4
-
-
Kuncheva, L.I.1
-
16
-
-
33749389929
-
Object detection and feature base learning with sparse convolutional neural networks
-
Ulm, Germany, LNCS, August
-
A. Gepperth, Object detection and feature base learning with sparse convolutional neural networks, in Proc. of the 2nd International conference on Artificial Neural Networks in Pattern Recognition (ANNPR'06), Ulm, Germany, LNCS, vol. 4087, August 2006, pp. 221-232.
-
(2006)
Proc. of the 2nd International Conference On Artificial Neural Networks In Pattern Recognition (ANNPR'06)
, vol.4087
, pp. 221-232
-
-
Gepperth, A.1
-
17
-
-
84867468574
-
Voting with a parameterized veto strategy: Solving the KDD cup 2006 problem by means of a classifier committee
-
D. Tikk, Z. T. Kardkovács, and F. P. Szidarovszky, Voting with a parameterized veto strategy: Solving the KDD cup 2006 problem by means of a classifier committee, ACM Special Interest Group on Knowledge Discovery and Data Mining Explorations, vol. 8, no. 2, pp. 53-62, 2006.
-
(2006)
ACM Special Interest Group On Knowledge Discovery and Data Mining Explorations
, vol.8
, Issue.2
, pp. 53-62
-
-
Tikk, D.1
Kardkovács, Z.T.2
Szidarovszky, F.P.3
-
18
-
-
84886932038
-
Vote/veto meta-classifier for authorship identification notebook for pan
-
Amsterdam, Netherlands, September
-
R. Kern, C. Seifert, M. Zechner, and M. Granitzer, Vote/veto meta-classifier for authorship identification notebook for pan, in Proc. of the Conference on Multilingual and Multimodal Information Access Evaluation (CLEF'11), Amsterdam, Netherlands, September 2011.
-
(2011)
Proc. of the Conference On Multilingual and Multimodal Information Access Evaluation (CLEF'11)
-
-
Kern, R.1
Seifert, C.2
Zechner, M.3
Granitzer, M.4
-
19
-
-
58549090885
-
Improving malware detection by applying multi-inducer ensemble
-
E. Menahem, A. Shabtai, L. Rokach, and Y. Elovici, Improving malware detection by applying multi-inducer ensemble, Computational Statistics & Data Analysis, vol. 53, no. 4, pp. 1483-1494, 2009.
-
(2009)
Computational Statistics & Data Analysis
, vol.53
, Issue.4
, pp. 1483-1494
-
-
Menahem, E.1
Shabtai, A.2
Rokach, L.3
Elovici, Y.4
-
20
-
-
38049020213
-
Malicious codes detection based on ensemble learning
-
Hong Kong, China, LNCS, Springer-Verlag, July
-
B. Zhang, J. Yin, J. Hao, D. Zhang, and S. Wang, Malicious codes detection based on ensemble learning, in Proc. of the 4th International Conference on Autonomic and Trusted Computing (ATC'07), Hong Kong, China, LNCS, vol. 4610. Springer-Verlag, July 2007, pp. 468-477.
-
(2007)
Proc. of the 4th International Conference On Autonomic and Trusted Computing (ATC'07)
, vol.4610
, pp. 468-477
-
-
Zhang, B.1
Yin, J.2
Hao, J.3
Zhang, D.4
Wang, S.5
-
21
-
-
51849107341
-
Unknown malcode detection via text categorization and the imbalance problem
-
Taipei, Taiwan. IEEE, June
-
R. Moskovitch, D. Stopel, C. Feher, N. Nissim, and Y. Elovici, Unknown malcode detection via text categorization and the imbalance problem, in Proc. of the 2008 International Conference on Intelligence and Security Informatics (ISI'08), Taipei, Taiwan. IEEE, June 2008, pp. 156-61.
-
(2008)
Proc. of the 2008 International Conference On Intelligence and Security Informatics (ISI'08)
, pp. 156-161
-
-
Moskovitch, R.1
Stopel, D.2
Feher, C.3
Nissim, N.4
Elovici, Y.5
-
22
-
-
0002863367
-
Valuation of trust in open networks
-
Brighton, UK, LNCS, SpringerVerlag, November
-
T. Beth, M. Borcherding, and B. Klein, Valuation of trust in open networks, in Proc. of the 3rd European Symposium on Research in Computer Security (ESORICS'94), Brighton, UK, LNCS, vol. 875. SpringerVerlag, November 1994, pp. 3-18.
-
(1994)
Proc. of the 3rd European Symposium On Research In Computer Security (ESORICS'94)
, vol.875
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
23
-
-
0030709945
-
Path independence for authentication in large-scale systems
-
Zurich, Switzerland. ACM, April
-
M. K. Reiter and S. G. Stubblebine, Path independence for authentication in large-scale systems, in Proc. of the ACM Conference on Computer and Communications Security (CCS'97), Zurich, Switzerland. ACM, April 1997, pp. 57-66.
-
(1997)
Proc. of the ACM Conference On Computer and Communications Security (CCS'97)
, pp. 57-66
-
-
Reiter, M.K.1
Stubblebine, S.G.2
-
26
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
Budapest, Hungary. ACM, May
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The eigentrust algorithm for reputation management in P2P networks, in Proc. of the 12th International Conference on World Wide Web (WWW'03), Budapest, Hungary. ACM, May 2003.
-
(2003)
Proc. of the 12th International Conference On World Wide Web (WWW'03)
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
27
-
-
35548952012
-
A non-manipulable trust system based on eigentrust
-
Z. Abrams, R. McGrew, and S. Plotkin, A non-manipulable trust system based on eigentrust, Special Interest Group on Electronic Commerce Exchanges, vol. 5, no. 4, pp. 21-30, 2005.
-
(2005)
Special Interest Group On Electronic Commerce Exchanges
, vol.5
, Issue.4
, pp. 21-30
-
-
Abrams, Z.1
McGrew, R.2
Plotkin, S.3
-
28
-
-
84888542471
-
Evaluating trust in mobile ad hoc networks
-
Xi'an, China, LNCS, Springer-Verlag, December
-
X. Li, J. Slay, and S. Yu, Evaluating trust in mobile ad hoc networks, in Proc. of the Workshop of International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China, LNCS, vol. 380. Springer-Verlag, December 2005.
-
(2005)
Proc. of the Workshop of International Conference On Computational Intelligence and Security (CIS'05)
, pp. 380
-
-
Li, X.1
Slay, J.2
Yu, S.3
-
29
-
-
84886892091
-
A generic trust framework for large-scale open systems using machine learning
-
X. Liu, G. Trédan, and A. Datta, A generic trust framework for large-scale open systems using machine learning, Computing Research Repository, vol. 1103.0086, 2011.
-
(2011)
Computing Research Repository
, vol.1103
, pp. 0086
-
-
Liu, X.1
Trédan, G.2
Datta, A.3
-
30
-
-
0033366097
-
Maximizing text-mining performance
-
S. M. Weiss, C. Apte, F. J. Damerau, D. E. Johnson, F. J. Oles, T. Goetz, and T. Hampp, Maximizing text-mining performance, IEEE Intelligent Systems and their Applications, vol. 14, no. 4, pp. 63-69, 1999.
-
(1999)
IEEE Intelligent Systems and Their Applications
, vol.14
, Issue.4
, pp. 63-69
-
-
Weiss, S.M.1
Apte, C.2
Damerau, F.J.3
Johnson, D.E.4
Oles, F.J.5
Goetz, T.6
Hampp, T.7
-
31
-
-
0000179430
-
Methods for dynamic classifier selection
-
Venice, Italy. IEEE, September
-
G. Giacinto and F. Roli, Methods for dynamic classifier selection, in Proc. of the 10th International Conference on Image Analysis and Processing (ICIAP'99), Venice, Italy. IEEE, September 1999, pp. 659-664.
-
(1999)
Proc. of the 10th International Conference On Image Analysis and Processing (ICIAP'99)
, pp. 659-664
-
-
Giacinto, G.1
Roli, F.2
-
32
-
-
34848892731
-
A dynamic classifier selection method to build ensembles using accuracy and diversity
-
Ribeirão Petro, Brazil. IEEE, October
-
A. Santana, R. G. F. Soares, A. M. P. Canuto, and M. C. P. d. Souto, A dynamic classifier selection method to build ensembles using accuracy and diversity, in Proc. of the 9th Brazilian Symposium on Neural Networks (SBRN'06), Ribeirão Petro, Brazil. IEEE, October 2006, pp. 36-41.
-
(2006)
Proc. of the 9th Brazilian Symposium On Neural Networks (SBRN'06)
, pp. 36-41
-
-
Santana, A.1
Soares, R.G.F.2
Canuto, A.M.P.3
Souto, M.C.P.D.4
-
33
-
-
84886889754
-
-
Master's thesis, Rochester Institute of Technology, Rochester, USA
-
F. Talib, Computational aspects of voting: A literature survey, Master's thesis, Rochester Institute of Technology, Rochester, USA, 2007.
-
(2007)
Computational Aspects of Voting: A Literature Survey
-
-
Talib, F.1
-
34
-
-
0010985846
-
Voting with proportional veto power
-
H. Moulin, Voting with proportional veto power, Econometrica, vol. 50, no. 1, pp. 145-62, 1982.
-
(1982)
Econometrica
, vol.50
, Issue.1
, pp. 145-162
-
-
Moulin, H.1
-
35
-
-
76749092270
-
The WEKA data mining software: An update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, The WEKA data mining software: an update, ACM Special Interest Group on Knowledge Discovery and Data Mining Explorations, vol. 11, pp. 10-18, 2009.
-
(2009)
ACM Special Interest Group On Knowledge Discovery and Data Mining Explorations
, vol.11
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
36
-
-
58849157332
-
Unknown malcode detection using OPCODE representation
-
Esbjerg, Denmark, LNCS, Springer-Verlag, December
-
R. Moskovitch, C. Feher, N. Tzachar, E. Berger, M. Gitelman, S. Dolev, and Y. Elovici, Unknown malcode detection using OPCODE representation, in Proc. of the 1st European Conference on Intelligence and Security Informatics (EuroISI'08), Esbjerg, Denmark, LNCS, vol. 5376. Springer-Verlag, December 2008, pp. 204-215.
-
(2008)
Proc. of the 1st European Conference On Intelligence and Security Informatics (EuroISI'08)
, vol.5376
, pp. 204-215
-
-
Moskovitch, R.1
Feher, C.2
Tzachar, N.3
Berger, E.4
Gitelman, M.5
Dolev, S.6
Elovici, Y.7
-
37
-
-
45549117987
-
Term-weighting approaches in automatic text retrieval
-
August
-
G. Salton and C. Buckley, Term-weighting approaches in automatic text retrieval, Information Processing and Managment, vol. 24, no. 5, pp. 513-523, August 1988.
-
(1988)
Information Processing and Managment
, vol.24
, Issue.5
, pp. 513-523
-
-
Salton, G.1
Buckley, C.2
-
38
-
-
85149612939
-
Fast effective rule induction
-
California, USA. Morgan Kaufmann Publishers Inc., July
-
W. W. Cohen, Fast effective rule induction, in Proc. of 12th International Conference on Machine Learning (ICML'95), California, USA. Morgan Kaufmann Publishers Inc., July 1995, pp. 115-23.
-
(1995)
Proc. of 12th International Conference On Machine Learning (ICML'95)
, pp. 115-123
-
-
Cohen, W.W.1
-
40
-
-
84926662675
-
Nearest neighbor pattern classification
-
T. M. Cover and P. E. Hart, Nearest neighbor pattern classification, IEEE Transactions on Information Theory, vol. 13, no. 1, pp. 21-27, 1967.
-
(1967)
IEEE Transactions On Information Theory
, vol.13
, Issue.1
, pp. 21-27
-
-
Cover, T.M.1
Hart, P.E.2
-
41
-
-
0003120218
-
Sequential minimal optimization: A fast algorithm for training support vector machines
-
J. Platt, Sequential minimal optimization: A fast algorithm for training support vector machines, Advances in Kernel Methods-Support Vector Learning, vol. 208, pp. 98-112, 1999.
-
(1999)
Advances In Kernel Methods-Support Vector Learning
, vol.208
, pp. 98-112
-
-
Platt, J.1
-
43
-
-
0041609695
-
Experiments with the CENPARMI data base combining different classification approaches
-
Buffalo, New York, USA, May
-
J. Franke, L. Lam, R. Legault, C. P. Nadal, and C. Y. Suen, Experiments with the CENPARMI data base combining different classification approaches, in Proc. of the 3rd International Workshop on Frontiers in Handwriting Recognition (ICFHR'93), Buffalo, New York, USA, May 1993, pp. 305-311.
-
(1993)
Proc. of the 3rd International Workshop On Frontiers In Handwriting Recognition (ICFHR'93)
, pp. 305-311
-
-
Franke, J.1
Lam, L.2
Legault, R.3
Nadal, C.P.4
Suen, C.Y.5
-
44
-
-
84947791171
-
Multiple classifier combination for character recognition: Revisiting the majority voting system and its variations
-
Princeton, USA, LNCS, Springer-Verlag, August
-
A. F. R. Rahman, H. Alam, and M. C. Fairhurst, Multiple classifier combination for character recognition: Revisiting the majority voting system and its variations, in Proc. of the 5th International Workshop on Document Analysis Systems (DAS'02). Princeton, USA, LNCS, vol. 2423. Springer-Verlag, August 2002, pp. 167-178.
-
(2002)
Proc. of the 5th International Workshop On Document Analysis Systems (DAS'02)
, vol.2423
, pp. 167-178
-
-
Rahman, A.F.R.1
Alam, H.2
Fairhurst, M.C.3
-
45
-
-
10444224737
-
Classifier selection for majority voting
-
D. Ruta and G. Bogdan, Classifier selection for majority voting, Information Fusion, vol. 6, no. 1, pp. 63-81, 2005.
-
(2005)
Information Fusion
, vol.6
, Issue.1
, pp. 63-81
-
-
Ruta, D.1
Bogdan, G.2
|