An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing
暂无分享,去创建一个
Tao Ban | Seiichi Ozawa | Jumpei Shimamura | Junji Nakazato | Siti-Hajar-Aminah Ali | S. Ozawa | Tao Ban | J. Nakazato | Jumpei Shimamura | Siti-Hajar-Aminah Ali
[1] Tao Ban,et al. Detecting Malicious Spam Mails: An Online Machine Learning Approach , 2014, ICONIP.
[2] Seiichi Ozawa,et al. A Neural Network Model for Large-Scale Stream Data Learning Using Locally Sensitive Hashing , 2013, ICONIP.
[3] Christopher Hadnagy,et al. Social Engineering: The Art of Human Hacking , 2010 .
[4] Seiichi Ozawa,et al. An Autonomous Incremental Learning Algorithm for Radial Basis Function Networks , 2010, J. Intell. Learn. Syst. Appl..
[5] Yen-Jen Oyang,et al. Data classification with radial basis function networks based on a novel kernel density estimation algorithm , 2005, IEEE Transactions on Neural Networks.
[6] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[7] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[8] Ting Li,et al. Locality sensitive hashing based searching scheme for a massive database , 2008, IEEE SoutheastCon 2008.
[9] Shaoning Pang,et al. Incremental Learning of Chunk Data for Online Pattern Classification Systems , 2008, IEEE Transactions on Neural Networks.
[10] John C. Platt. A Resource-Allocating Network for Function Interpolation , 1991, Neural Computation.
[11] Stephen E. Robertson,et al. Okapi at TREC-3 , 1994, TREC.
[12] Stephen E. Robertson,et al. GatfordCentre for Interactive Systems ResearchDepartment of Information , 1996 .
[13] Diane Gan,et al. A targeted malicious email (TME) attack tool , 2012 .
[14] Julie J.C.H. Ryan,et al. Detecting targeted malicious email through supervised classification of persistent threat and recipient oriented features , 2010 .
[15] S. Hyakin,et al. Neural Networks: A Comprehensive Foundation , 1994 .
[16] P. Langley. Selection of Relevant Features in Machine Learning , 1994 .
[17] Marko Grobelnik,et al. Feature Selection Using Linear Support Vector Machines , 2002 .
[18] Saadat Nazirova. Survey on Spam Filtering Techniques , 2011, Commun. Netw..
[19] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[20] V. Sujatha,et al. An Innovative Approach for Detecting Targeted Malicious E-mail , 2013 .
[21] Kyung Mi Lee,et al. Similar pair identification using locality-sensitive hashing technique , 2012, The 6th International Conference on Soft Computing and Intelligent Systems, and The 13th International Symposium on Advanced Intelligence Systems.
[22] Jungsuk Song,et al. Network Security Incident Response Technology: Clustering and Feature Selection Methods for Analyzing Spam Based Attacks , 2012 .
[23] J. Nazuno. Haykin, Simon. Neural networks: A comprehensive foundation, Prentice Hall, Inc. Segunda Edición, 1999 , 2000 .
[24] Yongdong Zhang,et al. An improved method of locality sensitive hashing for indexing large-scale and high-dimensional features , 2013, Signal Process..