Sciweavers

271 search results - page 32 / 55
» Automatic analysis of malware behavior using machine learnin...
Sort
View
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 7 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
CAIP
2007
Springer
117views Image Analysis» more  CAIP 2007»
14 years 3 months ago
Eigenmotion-Based Detection of Intestinal Contractions
Abstract. Intestinal contractions are one of the main features for analyzing intestinal motility and detecting different gastrointestinal pathologies. In this paper we propose Eig...
Laura Igual, Santi Seguí, Jordi Vitri&agrav...
IJCNLP
2005
Springer
14 years 2 months ago
Corpus-Based Analysis of Japanese Relative Clause Constructions
Japanese relative clause constructions (RCC’s) are defined as being the NP’s of structure ‘S NP’, noting the lack of a relative pronoun or any other explicit form of noun-...
Takeshi Abekawa, Manabu Okumura
ECML
2006
Springer
14 years 14 days ago
Unsupervised Multiple-Instance Learning for Functional Profiling of Genomic Data
Multiple-instance learning (MIL) is a popular concept among the AI community to support supervised learning applications in situations where only incomplete knowledge is available....
Corneliu Henegar, Karine Clément, Jean-Dani...
ICML
2010
IEEE
13 years 10 months ago
Detecting Large-Scale System Problems by Mining Console Logs
Surprisingly, console logs rarely help operators detect problems in large-scale datacenter services, for they often consist of the voluminous intermixing of messages from many sof...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...