Hardening Email Security via Bayesian Additive Regression Trees
暂无分享,去创建一个
Suku Nair | Xinlei Wang | Saeed Abu-Nimeh | D. Nappa | Saeed Abu-Nimeh | D. Nappa | Xinlei Wang | S. Nair
[1] H. Chipman,et al. Bayesian CART Model Search , 1998 .
[2] Jasvinder S. Kandola,et al. Interpretable modelling with sparse kernels , 2001 .
[3] Trevor Hastie,et al. The Elements of Statistical Learning , 2001 .
[4] Geoffrey E. Hinton,et al. Bayesian Learning for Neural Networks , 1995 .
[5] Georgios Paliouras,et al. A Memory-Based Approach to Anti-Spam Filtering for Mailing Lists , 2004, Information Retrieval.
[6] Leo Breiman,et al. Classification and Regression Trees , 1984 .
[7] Michael W. Berry,et al. Survey of Text Mining , 2003, Springer New York.
[8] Tong Zhang,et al. Text Mining: Predictive Methods for Analyzing Unstructured Information , 2004 .
[9] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[10] H. Chipman,et al. BART: Bayesian Additive Regression Trees , 2008, 0806.3286.
[11] Suku Nair,et al. A comparison of machine learning techniques for phishing detection , 2007, eCrime '07.
[12] Wei-Yin Loh,et al. Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..
[13] Michael McGill,et al. Introduction to Modern Information Retrieval , 1983 .
[14] Lance James,et al. Phishing exposed , 2005 .
[15] Hans C. van Houwelingen,et al. The Elements of Statistical Learning, Data Mining, Inference, and Prediction. Trevor Hastie, Robert Tibshirani and Jerome Friedman, Springer, New York, 2001. No. of pages: xvi+533. ISBN 0‐387‐95284‐5 , 2004 .
[16] Jon Rigelsford,et al. Pattern Recognition: Concepts, Methods and Applications , 2002 .
[17] Michael W. Berry,et al. Survey of Text Mining: Clustering, Classification, and Retrieval , 2007 .
[18] Robert Tibshirani,et al. The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.
[19] F. Wilcoxon. Individual Comparisons by Ranking Methods , 1945 .
[20] Janez Demsar,et al. Statistical Comparisons of Classifiers over Multiple Data Sets , 2006, J. Mach. Learn. Res..
[21] Heekuck Oh,et al. Neural Networks for Pattern Recognition , 1993, Adv. Comput..
[22] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[23] KarkaletsisVangelis,et al. A Memory-Based Approach to Anti-Spam Filtering for Mailing Lists , 2003 .
[24] Charles X. Ling,et al. Using AUC and accuracy in evaluating learning algorithms , 2005, IEEE Transactions on Knowledge and Data Engineering.
[25] Barton C. Massey,et al. Learning Spam: Simple Techniques For Freely-Available Software , 2003, USENIX Annual Technical Conference, FREENIX Track.
[26] S. Chib,et al. Bayesian analysis of binary and polychotomous response data , 1993 .
[27] Tianshun Yao,et al. An evaluation of statistical spam filtering techniques , 2004, TALIP.
[28] Suku Nair,et al. Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy , 2008, 2008 Third International Conference on Availability, Reliability and Security.