Sciweavers

3556 search results - page 605 / 712
» Can machine learning be secure
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 3 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
KDD
2004
ACM
624views Data Mining» more  KDD 2004»
14 years 3 months ago
Programming the K-means clustering algorithm in SQL
Using SQL has not been considered an efficient and feasible way to implement data mining algorithms. Although this is true for many data mining, machine learning and statistical a...
Carlos Ordonez
JCDL
2003
ACM
152views Education» more  JCDL 2003»
14 years 3 months ago
eBizSearch: An OAI-Compliant Digital Library for eBusiness
Niche Search Engines offer an efficient alternative to traditional search engines when the results returned by general-purpose search engines do not provide a sufficient degree of...
Yves Petinot, Pradeep B. Teregowda, Hui Han, C. Le...
AUSAI
2003
Springer
14 years 3 months ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
Sang-Jun Han, Sung-Bae Cho
STACS
2010
Springer
14 years 3 months ago
A Dichotomy Theorem for the General Minimum Cost Homomorphism Problem
Abstract. In the constraint satisfaction problem (CSP), the aim is to find an assignment of values to a set of variables subject to specified constraints. In the minimum cost hom...
Rustem Takhanov