Sciweavers

251 search results - page 13 / 51
» Using Rough Set and Support Vector Machine for Network Intru...
Sort
View
RAID
2000
Springer
14 years 11 days ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
IJCNN
2006
IEEE
14 years 2 months ago
A Heuristic for Free Parameter Optimization with Support Vector Machines
— A heuristic is proposed to address free parameter selection for Support Vector Machines, with the goals of improving generalization performance and providing greater insensitiv...
Matthew Boardman, Thomas P. Trappenberg
JMLR
2010
169views more  JMLR 2010»
13 years 3 months ago
Consensus-Based Distributed Support Vector Machines
This paper develops algorithms to train support vector machines when training data are distributed across different nodes, and their communication to a centralized processing unit...
Pedro A. Forero, Alfonso Cano, Georgios B. Giannak...
ECRIME
2007
14 years 22 days ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
ICPR
2002
IEEE
14 years 10 months ago
Incorporating Conditional Independence Assumption with Support Vector Machines to Enhance Handwritten Character Segmentation Per
Learning Bayesian Belief Networks (BBN) from corpora and incorporating the extracted inferring knowledge with a Support Vector Machines (SVM) classifier has been applied to charac...
Manolis Maragoudakis, Ergina Kavallieratou, Nikos ...