Sciweavers

1900 search results - page 88 / 380
» Gaussian Processes in Machine Learning
Sort
View
COMSUR
2008
108views more  COMSUR 2008»
13 years 9 months ago
A survey of techniques for internet traffic classification using machine learning
The research community has begun looking for IP traffic classification techniques that do not rely on `well known' TCP or UDP port numbers, or interpreting the contents of pac...
Thuy T. T. Nguyen, Grenville J. Armitage
JCS
2011
138views more  JCS 2011»
12 years 12 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
FORTE
2008
13 years 10 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
ICDE
2007
IEEE
96views Database» more  ICDE 2007»
14 years 26 days ago
Mining Software Data
Data mining techniques and machine learning methods are commonly used in several disciplines. It is possible that they could also provide a basis for quality assessment of softwar...
Burak Turhan, F. Onur Kutlubay
CIBCB
2006
IEEE
14 years 3 months ago
Machine Learning in Basecalling Decoding Trace Peak Behaviour
— DNA sequence basecalling is commonly regarded as a solved problem, despite significant error rates being reflected in inaccuracies in databases and genome annotations. These er...
David Thornley, Stavros Petridis