Sciweavers

988 search results - page 177 / 198
» Margin Based Active Learning
Sort
View
IMC
2009
ACM
14 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ITNG
2008
IEEE
14 years 4 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
BIRTHDAY
2005
Springer
14 years 3 months ago
Towards MultiMedia Instruction in Safe and Secure Systems
Abstract. The aim of the MMiSS project is the construction of a multimedia Internet-based adaptive educational system. Its content will initially cover a whole curriculum in the ar...
Bernd Krieg-Brückner
CE
2008
102views more  CE 2008»
13 years 10 months ago
E-Science in the classroom - Towards viability
E-Science has the potential to transform school science by enabling learners, teachers and research scientists to engage together in authentic scientific enquiry, collaboration an...
Joshua Underwood, Hilary Smith, Rosemary Luckin, G...
TCIAIG
2010
13 years 4 months ago
Game Bot Detection via Avatar Trajectory Analysis
The objective of this work is to automatically detect the use of game bots in online games based on the trajectories of account users. Online gaming has become one of the most popu...
Hsing-Kuo Pao, Kuan-Ta Chen, Hong-Chung Chang