Sciweavers

179 search results - page 5 / 36
» Learning at Low False Positive Rates
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 1 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
EC
2000
136views ECommerce» more  EC 2000»
13 years 7 months ago
Architecture for an Artificial Immune System
An artificial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including diversity, distributed computation, error tolerance, dynam...
Steven A. Hofmeyr, Stephanie Forrest
ICDM
2008
IEEE
126views Data Mining» more  ICDM 2008»
14 years 1 months ago
Detecting Suspicious Behavior in Surveillance Images
We introduce a novel technique to detect anomalies in images. The notion of normalcy is given by a baseline of images, under the assumption that the majority of such images is nor...
Daniel Barbará, Carlotta Domeniconi, Zoran ...
SIGSOFT
2006
ACM
14 years 8 months ago
How is aliasing used in systems software?
We present a study of all sources of aliasing in over one million lines of C code, identifying in the process the common patterns of aliasing that arise in practice. We find that ...
Brian Hackett, Alex Aiken
ICIP
2001
IEEE
14 years 9 months ago
Face detection from cluttered images using a polynomial neural network
In this paper, we propose a new method for face detection from cluttered images. We use a polynomial neural network (PNN) for separation of face and non-face patterns while the co...
Lin-Lin Huang, Akinobu Shimizu, Yoshihiro Hagihara...