Sciweavers

251 search results - page 13 / 51
» Using Rough Set and Support Vector Machine for Network Intru...
Sort
View
129
Voted
RAID
2000
Springer
15 years 6 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
126
Voted
IJCNN
2006
IEEE
15 years 8 months ago
A Heuristic for Free Parameter Optimization with Support Vector Machines
— A heuristic is proposed to address free parameter selection for Support Vector Machines, with the goals of improving generalization performance and providing greater insensitiv...
Matthew Boardman, Thomas P. Trappenberg
131
Voted
JMLR
2010
169views more  JMLR 2010»
14 years 9 months ago
Consensus-Based Distributed Support Vector Machines
This paper develops algorithms to train support vector machines when training data are distributed across different nodes, and their communication to a centralized processing unit...
Pedro A. Forero, Alfonso Cano, Georgios B. Giannak...
166
Voted
ECRIME
2007
15 years 6 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
135
Voted
ICPR
2002
IEEE
16 years 3 months ago
Incorporating Conditional Independence Assumption with Support Vector Machines to Enhance Handwritten Character Segmentation Per
Learning Bayesian Belief Networks (BBN) from corpora and incorporating the extracted inferring knowledge with a Support Vector Machines (SVM) classifier has been applied to charac...
Manolis Maragoudakis, Ergina Kavallieratou, Nikos ...