E‐Shape Analysis Page: 49
View a full description of this thesis.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
[17] Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, and Ke Wang,
Behavior-based modeling and its application to email analysis, ACM Trans. Internet Technol. 6 (2006),
no. 2, 187-221.
[18] W. T. Strayer, D. Lapsley, R. Walsh, and C. Livadas, Botnet detection based on network behavior, Botnet
Detection: Countering the Largest Security Threat (Wenke Lee, Cliff Wang, and David Dagon, eds.),
Springer-Verlag, 2007.
[19] TRACElabs, Template Based Spam, May 2009.
[20] P.H. Veltink, HansB.J. Bussmann, W. de Vries, WimL.J. Martens, and R.C. Van Lummel, Detection of
static and dynamic activities using uniaxial accelerometers, Rehabilitation Engineering, IEEE Transactions
on 4 (1996), no. 4, 375-385.
[21] Chih-Ping Wei, Hsueh-Ching Chen, and Tsang-Hsiang Cheng, Effective spam filtering: A single-class
learning and ensemble approach, Decis. Support Syst. 45 (2008), no. 3, 491-503.49
Search Inside
This thesis can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Thesis.
Sroufe, Paul. E‐Shape Analysis, thesis, December 2009; Denton, Texas. (https://digital.library.unt.edu/ark:/67531/metadc12201/m1/58/: accessed July 17, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .