Sciweavers

307 search results - page 36 / 62
» Host Based Intrusion Detection using Machine Learning
Sort
View
CCS
2004
ACM
14 years 27 days ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
ANCS
2006
ACM
14 years 1 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
BMCBI
2008
143views more  BMCBI 2008»
13 years 7 months ago
Automatic detection of exonic splicing enhancers (ESEs) using SVMs
Background: Exonic splicing enhancers (ESEs) activate nearby splice sites and promote the inclusion (vs. exclusion) of exons in which they reside, while being a binding site for S...
Britta Mersch, Alexander Gepperth, Sándor S...
CEAS
2008
Springer
13 years 9 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
ATAL
2006
Springer
13 years 11 months ago
A computer-supported cooperative learning system with multiagent intelligence
In this paper, we describe an innovative infrastructure to support student participation and collaboration and help the instructor manage large or distance classrooms using multia...
Leen-Kiat Soh, Nobel Khandaker, Xuliu Liu, Hong Ji...