Data processing: artificial intelligence – Machine learning
Reexamination Certificate
2011-08-02
2011-08-02
Gaffin, Jeffrey A (Department: 2129)
Data processing: artificial intelligence
Machine learning
Reexamination Certificate
active
07991710
ABSTRACT:
Landing pages associated with advertisements are partitioned into training landing pages and testing landing pages. Iterative training and testing of a classification mode on intrusion features of the partitioned landing pages is conducted until the occurrence of a cessation event. Feature weights are derived from the iterative training and testing, and are associated with the intrusion features. The associated feature weights and intrusion features can be used to classify other landing pages.
REFERENCES:
patent: 6654725 (2003-11-01), Langheinrich et al.
patent: 7111246 (2006-09-01), Suave et al.
patent: 7222127 (2007-05-01), Bem et al.
patent: 2004/0143756 (2004-07-01), Munson et al.
patent: 2005/0108227 (2005-05-01), Russell-Falla et al.
patent: 2006/0015404 (2006-01-01), Tran
patent: 2006/0085854 (2006-04-01), Agrawal et al.
patent: 2007/0118903 (2007-05-01), Bates et al.
Niels Provos, Peter Honeyman, ‘Hide and Seek:An introduction to Steganography’, 2003, IEEE, 1540-7993, pp. 32-44.
Casado, M. and Freedman, M.J., “Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification,” In Proceedings of the 4th Networked Systems Design and Implementation, Apr. 2007.
Christianson, B. and Harbison, W.S., “Why Isn't Trust Transitive?” In Proceedings of the International Workshop on Security Protocols, pp. 171-176, London, UK, 1997. Springer-Verlag.
Christodorescu, M., et al., “Malware Normalization,” Technical Report 1539, University of Wisconsin, Madison, Wisconsin, USA, Nov. 2005.
Cooke, E., et al., “The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets,” In Proceedings of the USENIX SRUTI Workshop, pp. 39-44, 2005.
Dean, J. and Ghemawat, S., “MapReduce: Simplified Data Processing on Large Clusters,” In Proceedings of the Sixth Symposium on Operating System Design and Implementation, pp. 137-150, Dec. 2004.
Microsoft Security Bulletin MS060-014, Vulnerability in the Microsoft Data Access Components (MDAC) Function Could Allow Code Execution (911562), <http://www.microsoft.com/technet/security/Bulletin/>, MS06-014.mspx, May 2006.
Moshchuk, A., et al., “A Crawler-based Study of Spyware on the Web,” In Proceedings of the 2006 Network and Distributed System Security Symposium, pp. 17-33, Feb. 2006.
Provos, N., et al., “The Ghost in the Browser Analysis of Web-based Malware,” [on-line], [Retrieved on Sep. 10, 2007], Retrieved from the internet <http://www.usenix.org/events/hotbots07/tech/full—papers/provos/provos.pdf>.
Wang Y-M., “Automated Web Patrol with Strider HoneyMonkeys:Finding Web Sites That Exploit Browser Vulnerabilities” In Proceedings of the 2006 Network and Distributed System Security Symposium, pp. 35-49, Feb. 2006.
U.S. Appl. No. 12/277,436, filed Nov. 25, 2008, Wolf et al.
Hammami, 2003, IEEE, 0-7695-1932, “WebGuard: Web based adult content detection and filtering system,” Proceedings of the IEEE/WIC international conference on webg intelligence (WI'03), 5 pages.
Bavor, Jr. Clayton W.
Davis Eric L.
Mavrommatis Panayiotis
Monson Christopher K.
Nakauchi Rachel
Coughlan Peter
Fish & Richardson P.C.
Gaffin Jeffrey A
Google Inc.
LandOfFree
Intrusive feature classification model does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Intrusive feature classification model, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Intrusive feature classification model will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2626578