Sciweavers

264 search results - page 26 / 53
» Machine Learning in Infrastructure Security
Sort
View
ISSRE
2010
IEEE
13 years 5 months ago
Security Trend Analysis with CVE Topic Models
—We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic models on their description texts to find prevalent vulnerability typ...
Stephan Neuhaus, Thomas Zimmermann
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
14 years 1 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
ECTEL
2007
Springer
14 years 1 months ago
Unifying Learning Object Repositories in MACE
Abstract. During the last years a series of repositories containing learning contents for architecture have been created. With all the repositories financed, designed, implemented...
Christian Prause, Stefaan Ternier, Tim de Jong, St...
AGENTS
1999
Springer
13 years 11 months ago
A Personal News Agent That Talks, Learns and Explains
Most work on intelligent information agents has thus far focused on systems that are accessible through the World Wide Web. As demanding schedules prohibit people from continuous ...
Daniel Billsus, Michael J. Pazzani
USITS
1997
13 years 8 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz