-
1
-
-
84869387308
-
Virus detection using clonal selection algorithm with genetic algorithm (vdc algorithm)
-
S. Afaneh et al. Virus detection using clonal selection algorithm with genetic algorithm (vdc algorithm). Applied Soft Computing, 13(1):239-246, 2013.
-
(2013)
Applied Soft Computing
, vol.13
, Issue.1
, pp. 239-246
-
-
Afaneh, S.1
-
2
-
-
55549103698
-
Keel: A software tool to assess evolutionary algorithms for data mining problems
-
J. Alcalá-Fdez et al. KEEL: A Software Tool to Assess Evolutionary Algorithms for Data Mining Problems. Soft Comput., 13(3):307-318, 2008.
-
(2008)
Soft Comput
, vol.13
, Issue.3
, pp. 307-318
-
-
Alcalá-Fdez, J.1
-
5
-
-
0043284115
-
Accuracy-based learning classifier systems: Models, analysis and applications to classification tasks
-
E. Bernadó-Mansilla and J. M. Garrell-Guiu. Accuracy-based Learning Classifier Systems: Models, Analysis and Applications to Classification Tasks. Evol. Comput., 11(3):209-238, 2003.
-
(2003)
Evol. Comput
, vol.11
, Issue.3
, pp. 209-238
-
-
Bernadó-Mansilla, E.1
Garrell-Guiu, J.M.2
-
7
-
-
85064176806
-
Measuring pay-per-install: The commoditization of malware distribution
-
J. Caballero et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution. In USENIX Security Symposium, 2011.
-
(2011)
USENIX Security Symposium
-
-
Caballero, J.1
-
8
-
-
84926662675
-
Nearest neighbor pattern classification
-
T. Cover and P. Hart. Nearest neighbor pattern classification. IEEE Trans. on Information Theory, 13(1):21-27, 1967.
-
(1967)
IEEE Trans. on Information Theory
, vol.13
, Issue.1
, pp. 21-27
-
-
Cover, T.1
Hart, P.2
-
11
-
-
0033116171
-
Slave: A genetic learning system based on an iterative approach
-
A. González and R. Pérez. Slave: A genetic learning system based on an iterative approach. IEEE Trans. on Fuzzy Systems, 7(2):176-191, 1999.
-
(1999)
IEEE Trans. on Fuzzy Systems
, vol.7
, Issue.2
, pp. 176-191
-
-
González, A.1
Pérez, R.2
-
20
-
-
84881183138
-
Driving in the cloud: An analysis of drive-by download operations and abuse reporting
-
Springer
-
A. Nappa et al. Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting. In Detection of Intrusions and Malware, and Vulnerability Assessment, volume 7967, pages 1-20. Springer, 2013.
-
(2013)
Detection of Intrusions and Malware, and Vulnerability Assessment
, vol.7967
, pp. 1-20
-
-
Nappa, A.1
-
21
-
-
85076751448
-
Behavioral clustering of http-based malware and signature generation using malicious network Traces
-
USENIX Association
-
R. Perdisci et al. Behavioral Clustering of HTTP-based Malware and Signature Generation Using Malicious Network Traces. In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, pages 26-26. USENIX Association, 2010.
-
(2010)
Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation
, pp. 26-26
-
-
Perdisci, R.1
-
22
-
-
0029678894
-
Improved use of continuous attributes in C4.5
-
J. R. Quinlan. Improved use of continuous attributes in C4.5. Journal of Art. Int. Res., 4:77-90, 1996.
-
(1996)
Journal of Art. Int. Res
, vol.4
, pp. 77-90
-
-
Quinlan, J.R.1
-
29
-
-
84905682499
-
-
Sophos report. http://www.sophos.com/en-us/medialibrary/ PDFs/other/sophos-security-threat-report-2014.pdf.
-
Sophos Report
-
-
-
30
-
-
0000648788
-
Generalization in the XCS classifier system
-
Morgan Kaufmann
-
S. Wilson. Generalization in the XCS classifier system. In AGPC, pages 665-674. Morgan Kaufmann, 1998.
-
(1998)
AGPC
, pp. 665-674
-
-
Wilson, S.1
-
32
-
-
84905682757
-
-
Zeus tracker. https://zeustracker.abuse.ch/index.php.
-
Zeus Tracker
-
-
|