This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
We have proposed a fault-prone software module detection method using text-filtering approach, called Fault-proneness filtering. Even though the fault-proneness filtering achieved...
We investigate an effective and robust mechanism for detecting SMTP traffic anomaly. Our detection method cumulates the deviation of current delivering status from history behavio...
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
In molecular resolution refutation, the detection of empty clauses is important. We propose a rolling circle amplification-based detection method for resolution refutation. The ro...
In-Hee Lee, Ji-Yoon Park, Young-Gyu Chai, Byoung-T...
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
This paper presents the time domain and timefrequency domain analysis results of incipient events in single-phase distribution transformers. This analysis will aid in the developm...
In this paper, we propose a new semantic event detection algorithm in structured video. A hybrid method that combines HMM with SVM to detect semantic events in video is proposed. T...
Tae Meon Bae, Cheon Seog Kim, Sung Ho Jin, Ki Hyun...
—Bandwidth usage has become more complex such that it is not uncommon that multiple signals of appreciable power may be present within the same bandwidth. The presence of multipl...
John Weber, Kyle Kowalske, Clark Robertson, Frank ...