Sciweavers

93 search results - page 14 / 19
» Data Reduction and Ensemble Classifiers in Intrusion Detecti...
Sort
View
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
14 years 7 months ago
Knowledge transfer via multiple model local structure mapping
The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Jing Gao, Wei Fan, Jing Jiang, Jiawei Han
DSP
2006
13 years 6 months ago
Detection of audio covert channels using statistical footprints of hidden messages
We address the problem of detecting the presence of hidden messages in audio. The detector is based on the characteristics of the denoised residuals of the audio file, which may c...
Hamza Özer, Bülent Sankur, Nasir D. Memo...
IJNSEC
2008
210views more  IJNSEC 2008»
13 years 6 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo
ICPR
2004
IEEE
14 years 7 months ago
Feature Subset Selection using ICA for Classifying Emphysema in HRCT Images
Feature subset selection, applied as a pre-processing step to machine learning, is valuable in dimensionality reduction, eliminating irrelevant data and improving classifier perfo...
Mithun Nagendra Prasad, Arcot Sowmya, Inge Koch
ACMSE
2006
ACM
13 years 8 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad