Search Results - "Menahem, Eitan"
-
1
Improving malware detection by applying multi-inducer ensemble
Published in Computational statistics & data analysis (15-02-2009)“…Detection of malicious software (malware) using machine learning methods has been explored extensively to enable fast detection of new released malware. The…”
Get full text
Journal Article -
2
XML-AD: Detecting anomalous patterns in XML documents
Published in Information sciences (01-01-2016)“…Many information systems use XML documents to store data and to interact with other systems. Abnormal documents, which can be the result of either an on-going…”
Get full text
Journal Article -
3
Troika – An improved stacking schema for classification tasks
Published in Information sciences (15-12-2009)“…Stacking is a general ensemble method in which a number of base classifiers are combined using one meta-classifier which learns their outputs. Such an approach…”
Get full text
Journal Article -
4
F-Sign: Automatic, Function-Based Signature Generation for Malware
Published in IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews (01-07-2011)“…In this research, we present a new method, termed F-Sign, for automatic extraction of unique signatures from malware files. F-Sign is primarily intended for…”
Get full text
Journal Article -
5
Detecting Spammers via Aggregated Historical Data Set
Published 07-05-2012“…The battle between email service providers and senders of mass unsolicited emails (Spam) continues to gain traction. Vast numbers of Spam emails are sent…”
Get full text
Journal Article -
6
ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks
Published 20-06-2013“…In this work we investigate a new approach for detecting attacks which aim to degrade the network's Quality of Service (QoS). To this end, a new network-based…”
Get full text
Journal Article -
7
Combining One-Class Classifiers via Meta-Learning
Published 22-12-2011“…Selecting the best classifier among the available ones is a difficult task, especially when only instances of one class exist. In this work we examine the…”
Get full text
Journal Article -
8
Securing Your Transactions: Detecting Anomalous Patterns In XML Documents
Published 09-09-2012“…XML transactions are used in many information systems to store data and interact with other systems. Abnormal transactions, the result of either an on-going…”
Get full text
Journal Article