There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
This paper presents experiments with an autonomous inspection robot, whose task was to highlight novel features in its environment from camera images. The experiments used two dif...
— Outliers refer to “minority” data that are different from most other data. They usually disturb data mining process. But, sometimes they provide valuable information. Thus,...
This paper presents a novel algorithm for real-time detection of clad height in laser cladding which is known as a layered manufacturing technique. A realtime measurement of clad g...
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...