Sciweavers

1288 search results - page 22 / 258
» Understanding the Hidden Web
Sort
View
CCS
2007
ACM
14 years 2 months ago
Keystroke statistical learning model for web authentication
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
14 years 18 days ago
Connecting the dots between news articles
The process of extracting useful knowledge from large datasets has become one of the most pressing problems in today’s society. The problem spans entire sectors, from scientists...
Dafna Shahaf, Carlos Guestrin
IMC
2010
ACM
13 years 6 months ago
Netalyzr: illuminating the edge network
In this paper we present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to...
Christian Kreibich, Nicholas Weaver, Boris Nechaev...
ACNS
2004
Springer
128views Cryptology» more  ACNS 2004»
14 years 2 months ago
A Novel Framework for Alert Correlation and Understanding
Abstract. We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the ...
Dong Yu, Deborah A. Frincke
JMLR
2010
151views more  JMLR 2010»
13 years 3 months ago
Understanding the difficulty of training deep feedforward neural networks
Whereas before 2006 it appears that deep multilayer neural networks were not successfully trained, since then several algorithms have been shown to successfully train them, with e...
Xavier Glorot, Yoshua Bengio