Sciweavers

318 search results - page 60 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
IROS
2006
IEEE
274views Robotics» more  IROS 2006»
14 years 2 months ago
Adaptive Scale Robust Segmentation for 2D Laser Scanner
Abstract— This paper presents a robust algorithm for segmentation and line detection in 2D range scans. The described method exploits the multimodal probability density function ...
Ruben Martinez-Cantin, José A. Castellanos,...
HAIS
2010
Springer
14 years 1 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
LREC
2008
150views Education» more  LREC 2008»
13 years 10 months ago
Causal Relation Extraction
This paper presents a supervised method for the detection and extraction of Causal Relations from open domain text. First we give a brief outline of the definition of causation an...
Eduardo Blanco, Núria Castell, Dan I. Moldo...
CCS
2010
ACM
13 years 8 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
IJON
2006
146views more  IJON 2006»
13 years 8 months ago
Feature selection and classification using flexible neural tree
The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
Yuehui Chen, Ajith Abraham, Bo Yang