Sciweavers

166 search results - page 29 / 34
» Full Bayesian network classifiers
Sort
View
ACSAC
2004
IEEE
14 years 22 days ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
ECML
2006
Springer
14 years 20 days ago
Fisher Kernels for Relational Data
Abstract. Combining statistical and relational learning receives currently a lot of attention. The majority of statistical relational learning approaches focus on density estimatio...
Uwe Dick, Kristian Kersting
IDEAL
2000
Springer
14 years 17 days ago
Quantization of Continuous Input Variables for Binary Classification
Quantization of continuous variables is important in data analysis, especially for some model classes such as Bayesian networks and decision trees, which use discrete variables. Of...
Michal Skubacz, Jaakko Hollmén
ICONIP
2008
13 years 10 months ago
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
ICSE
2004
IEEE-ACM
14 years 9 months ago
Making Resource Decisions for Software Projects
Software metrics should support managerial decision making in software projects. We explain how traditional metrics approaches, such as regression-based models for cost estimation...
Norman E. Fenton, William Marsh, Martin Neil, Patr...