Detecting Suspicious Texts Using Machine Learning Techniques
نویسندگان
چکیده
منابع مشابه
Detecting Malignant TLS Servers Using Machine Learning Techniques
TLS uses X.509 certificates for server authentication. A X.509 certificate is a complex document and various innocent errors may occur while creating/ using it. Also, many certificates belong to malicious websites and should be rejected by the client and those web servers should not be visited. Usually, when a client finds a certificate that is doubtful using the traditional tests, it asks for ...
متن کاملDetecting Falls with Wearable Sensors Using Machine Learning Techniques
Falls are a serious public health problem and possibly life threatening for people in fall risk groups. We develop an automated fall detection system with wearable motion sensor units fitted to the subjects' body at six different positions. Each unit comprises three tri-axial devices (accelerometer, gyroscope, and magnetometer/compass). Fourteen volunteers perform a standardized set of movement...
متن کاملFiltering artificial texts with statistical machine learning techniques
Fake content is flourishing on the Internet, ranging from basic random word salads to web scraping. Most of this fake content is generated for the purpose of nourishing fake web sites aimed at biasing search engine indexes: at the scale of a search engine, using automatically generated texts render such sites harder to detect than using copies of existing pages. In this paper, we present three ...
متن کاملDetecting Cognitive States Using Machine Learning
Very little is known about the relationship between the cognitive states and the fMRI data, and very little is known about the feasibility of training classifiers to decode cognitive states. Our efforts aimed to automatically discover which spatial-temporal patterns in the fMRI data indicate a subject is performing a specific cognitive task, such as watching a picture or sentence. We developed ...
متن کاملDetecting worm mutations using machine learning
Worms are malicious programs that spread over the Internet without human intervention. Since worms generally spread faster than humans can respond, the only viable defence is to automate their detection. Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean that new worms cannot be detected until the co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied Sciences
سال: 2020
ISSN: 2076-3417
DOI: 10.3390/app10186527