Sciweavers

179 search results - page 20 / 36
» Learning at Low False Positive Rates
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...
ICML
2002
IEEE
14 years 8 months ago
Learning Decision Trees Using the Area Under the ROC Curve
ROC analysis is increasingly being recognised as an important tool for evaluation and comparison of classifiers when the operating characteristics (i.e. class distribution and cos...
César Ferri, José Hernández-O...
NOSSDAV
2010
Springer
14 years 8 days ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
EDBT
2011
ACM
254views Database» more  EDBT 2011»
12 years 11 months ago
SocialSearch: enhancing entity search with social network matching
This paper introduces the problem of matching people names to their corresponding social network identities such as their Twitter accounts. Existing tools for this purpose build u...
Gae-won You, Seung-won Hwang, Zaiqing Nie, Ji-Rong...
SMC
2007
IEEE
130views Control Systems» more  SMC 2007»
14 years 1 months ago
A flow based approach for SSH traffic detection
— The basic objective of this work is to assess the utility of two supervised learning algorithms AdaBoost and RIPPER for classifying SSH traffic from log files without using f...
Riyad Alshammari, A. Nur Zincir-Heywood