Sciweavers

100 search results - page 16 / 20
» Mining specifications of malicious behavior
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
14 years 8 months ago
Active exploration for learning rankings from clickthrough data
We address the task of learning rankings of documents from search engine logs of user behavior. Previous work on this problem has relied on passively collected clickthrough data. ...
Filip Radlinski, Thorsten Joachims
GIS
2007
ACM
14 years 1 months ago
Predicting future locations using clusters' centroids
As technology advances we encounter more available data on moving objects, thus increasing our ability to mine spatiotemporal data. We can use this data for learning moving object...
Sigal Elnekave, Mark Last, Oded Maimon
ADC
2005
Springer
183views Database» more  ADC 2005»
14 years 1 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
KDD
1999
ACM
145views Data Mining» more  KDD 1999»
13 years 11 months ago
Discovery of Fraud Rules for Telecommunications - Challenges and Solutions
Many fraud analysis systemshave at their heart a rule-based enginefor generatingalertsaboutsuspiciousbehaviors.The rules in the systemareusually basedon expert knowledge. Automati...
Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak I...