Learn More
Users and network administrators need ways to filter email messages based primarily on the reputation of the sender. Unfortunately, conventional mechanisms for sender reputation—notably, IP blacklists—are cumbersome to maintain and evadable. This paper investigates ways to infer the reputation of an email sender based solely on network-level features,(More)
With the increase in the size of real-world databases, there is an ever-increasing need to scale up inductive learning algorithms. Incremental learning techniques are one possible solution to the scalability problem. In this paper, we propose three ctiteria to evaluate the robustness and reliability of incremental learning methods, and use them to study the(More)
Limited fidelity of software-based wireless network simulations has prompted many researchers to build testbeds for developing and evaluating their wireless protocols and mobile applications. Since most testbeds are tailored to the needs of specific research projects, they cannot be easily reused for other research projects that may have different(More)
P300 is an event-related potential that is elicited by an oddball paradigm. In several neuropsychiatric diseases, differences in latencies and amplitude compared to healthy subjects have been reported. Because of its clinical significance, several investigations have tried to elucidate the intracranial origins of the P300 component. In the present study we(More)
As databases for real-world problems increase in size, there is a need in many situations to select and keep relevant training data for efficient storage and processing reasons. Support vector machines (SVMs) reportedly exhibit certain desirable properties in selecting and preserving useful training data as support vectors. This paper attempts to quantify(More)
Current spam filtering techniques classify email based on content and IP reputation blacklists or whitelists. Unfortunately , spammers can alter spam content to evade content-based filters, and spammers continually change the IP addresses from which they send spam. Previous work has suggested that filters based on network-level behavior might be more(More)
  • 1