Sciweavers

318 search results - page 5 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
CORR
2008
Springer
193views Education» more  CORR 2008»
13 years 7 months ago
Faster and better: a machine learning approach to corner detection
The repeatability and efficiency of a corner detector determines how likely it is to be useful in a real-world application. The repeatability is importand because the same scene vi...
Edward Rosten, Reid Porter, Tom Drummond
CEAS
2008
Springer
13 years 9 months ago
Detecting Known and New Salting Tricks in Unwanted Emails
Spam and phishing emails are not only annoying to users, but are a real threat to internet communication and web economy. The fight against unwanted emails has become a cat-and-mo...
André Bergholz, Gerhard Paass, Frank Reicha...
CORR
2004
Springer
140views Education» more  CORR 2004»
13 years 7 months ago
Integrating Defeasible Argumentation and Machine Learning Techniques
The field of machine learning (ML) is concerned with the question of how to construct algorithms that automatically improve with experience. In recent years many successful ML app...
Sergio Alejandro Gómez, Carlos Iván ...
AIME
1997
Springer
13 years 11 months ago
Detecting Very Early Stages of Dementia from Normal Aging with Machine Learning Methods
We used Machine Learning (ML) methods to learn the best decision rules to distinguish normal brain aging from the earliest stages of dementia using subsamples of 198 normal and 244...
William Rodman Shankle, Subramani Mani, Michael J....
ICIAP
2005
ACM
14 years 7 months ago
Learning Intrusion Detection: Supervised or Unsupervised?
Abstract. Application and development of specialized machine learning techniques is gaining increasing attention in the intrusion detection community. A variety of learning techniq...
Pavel Laskov, Patrick Düssel, Christin Sch&au...