We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password pairs. Presenta...
The transformation from film-based to filmless operations has become more and more challenging as medical imaging studies expand in size and complexity. To adapt to these changes ...
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
We propose an hybrid and probabilistic classification of image regions belonging to scenes primarily containing natural objects, e.g. sky, trees, etc. as a first step in solving ...