In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
In this paper we embed evolutionary computation into statistical learning theory. First, we outline the connection between large margin optimization and statistical learning and s...
Auditing a web siteās content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why itā...
Background: With the amount of influenza genome sequence data growing rapidly, researchers need machine assistance in selecting datasets and exploring the data. Enhanced visualiza...
Which active learning methods can we expect to yield good performance in learning binary and multi-category logistic regression classiļ¬ers? Addressing this question is a natural ...