Sciweavers

716 search results - page 22 / 144
» Proactive Network Maintenance Using Machine Learning
Sort
View
ECRIME
2007
13 years 11 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
ICALT
2007
IEEE
14 years 2 months ago
Designing a Bayesian Network based Student Model for Distance Learning Environments
This work proposes the exploration of student’s information through the use of Bayesian Networks. By using thisapproach we aim to model the uncertainty inherent to the studentâ€...
Michele Silva, Ricardo Azambuja Silveira, Cecilia ...
ICML
2006
IEEE
14 years 8 months ago
Full Bayesian network classifiers
The structure of a Bayesian network (BN) encodes variable independence. Learning the structure of a BN, however, is typically of high computational complexity. In this paper, we e...
Jiang Su, Harry Zhang
CORR
2006
Springer
143views Education» more  CORR 2006»
13 years 7 months ago
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
Although the Internet AS-level topology has been extensively studied over the past few years, little is known about the details of the AS taxonomy. An AS "node" can repre...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, G...
ICANN
2010
Springer
13 years 8 months ago
Policy Gradients for Cryptanalysis
So-called Physical Unclonable Functions are an emerging, new cryptographic and security primitive. They can potentially replace secret binary keys in vulnerable hardware systems an...
Frank Sehnke, Christian Osendorfer, Jan Sölte...