— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
The responses of cortical neurons are often characterized by measuring their spectro-temporal receptive fields (strfs). The strf of a cell can be thought of as a representation of...
Martin Coath, Emili Balaguer-Ballester, Sue L. Den...
For years, researchers in face recognition area have been representing and recognizing faces based on subspace discriminant analysis or statistical learning. Nevertheless, these a...
In the traditional setting, text categorization is formulated as a concept learning problem where each instance is a single isolated document. However, this perspective is not appr...