International Conference on Machine Learning for Networking最新文献

筛选
英文 中文
A Regret Minimization Approach to Frameless Irregular Repetition Slotted Aloha: IRSA-RM 无框不规则重复开槽Aloha的遗憾最小化方法:IRSA-RM
International Conference on Machine Learning for Networking Pub Date : 2020-11-24 DOI: 10.1007/978-3-030-70866-5_5
Iman Hmedoush, C. Adjih, P. Mühlethaler
{"title":"A Regret Minimization Approach to Frameless Irregular Repetition Slotted Aloha: IRSA-RM","authors":"Iman Hmedoush, C. Adjih, P. Mühlethaler","doi":"10.1007/978-3-030-70866-5_5","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_5","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Configuration Faults Detection in IP Virtual Private Networks Based on Machine Learning 基于机器学习的IP虚拟专用网配置故障检测
International Conference on Machine Learning for Networking Pub Date : 2020-11-24 DOI: 10.1007/978-3-030-70866-5_3
El-Heithem Mohammedi, E. Lavinal, Guillaume Fleury
{"title":"Configuration Faults Detection in IP Virtual Private Networks Based on Machine Learning","authors":"El-Heithem Mohammedi, E. Lavinal, Guillaume Fleury","doi":"10.1007/978-3-030-70866-5_3","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_3","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CSI Based Indoor Localization Using Ensemble Neural Networks 基于CSI的集成神经网络室内定位
International Conference on Machine Learning for Networking Pub Date : 2019-12-03 DOI: 10.1007/978-3-030-45778-5_25
Abdallah Sobehy, É. Renault, P. Mühlethaler
{"title":"CSI Based Indoor Localization Using Ensemble Neural Networks","authors":"Abdallah Sobehy, É. Renault, P. Mühlethaler","doi":"10.1007/978-3-030-45778-5_25","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_25","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121148270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model 基于联邦深度自编码高斯混合模型的网络异常检测
International Conference on Machine Learning for Networking Pub Date : 2019-12-03 DOI: 10.1007/978-3-030-45778-5_1
Y. Chen, Junzhe Zhang, C. Yeo
{"title":"Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model","authors":"Y. Chen, Junzhe Zhang, C. Yeo","doi":"10.1007/978-3-030-45778-5_1","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_1","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery 用于混淆流量检测和恢复的去噪对抗自编码器
International Conference on Machine Learning for Networking Pub Date : 2019-12-03 DOI: 10.1007/978-3-030-45778-5_8
O. Salman, I. Elhajj, A. Kayssi, A. Chehab
{"title":"Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery","authors":"O. Salman, I. Elhajj, A. Kayssi, A. Chehab","doi":"10.1007/978-3-030-45778-5_8","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_8","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132976169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative 反对使用1998年DARPA数据集进行云IDS设计和评估的争论及一些替代方案
International Conference on Machine Learning for Networking Pub Date : 2019-12-03 DOI: 10.1007/978-3-030-45778-5_21
Onyekachi Nwamuo, Paulo Magella de Faria Quinan, I. Traoré, I. Woungang, Abdulaziz Aldribi
{"title":"Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative","authors":"Onyekachi Nwamuo, Paulo Magella de Faria Quinan, I. Traoré, I. Woungang, Abdulaziz Aldribi","doi":"10.1007/978-3-030-45778-5_21","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_21","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Revealing User Behavior by Analyzing DNS Traffic 通过分析DNS流量揭示用户行为
International Conference on Machine Learning for Networking Pub Date : 2019-12-03 DOI: 10.1007/978-3-030-45778-5_14
Martín Panza, Diego Madariaga, Javier Bustos-Jiménez
{"title":"Revealing User Behavior by Analyzing DNS Traffic","authors":"Martín Panza, Diego Madariaga, Javier Bustos-Jiménez","doi":"10.1007/978-3-030-45778-5_14","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_14","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Jason-RS, a Collaboration between Agents and an IoT Platform Jason-RS,代理和物联网平台之间的协作
International Conference on Machine Learning for Networking Pub Date : 2019-12-03 DOI: 10.1007/978-3-030-45778-5_28
Hantanirina Felixie, J. Razafindramintsa, Sylvain Cherrier, Thomas Mahatody, L. George, Victor Manantsoa
{"title":"Jason-RS, a Collaboration between Agents and an IoT Platform","authors":"Hantanirina Felixie, J. Razafindramintsa, Sylvain Cherrier, Thomas Mahatody, L. George, Victor Manantsoa","doi":"10.1007/978-3-030-45778-5_28","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_28","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Approach Towards Analysis of Attacker Behavior in DDoS Attacks DDoS攻击中攻击者行为分析的新方法
International Conference on Machine Learning for Networking Pub Date : 2019-12-03 DOI: 10.1007/978-3-030-45778-5_27
Himanshu Gupta, T. Kulkarni, L. Kumar, Lalita Bhanu Murthy Neti
{"title":"A Novel Approach Towards Analysis of Attacker Behavior in DDoS Attacks","authors":"Himanshu Gupta, T. Kulkarni, L. Kumar, Lalita Bhanu Murthy Neti","doi":"10.1007/978-3-030-45778-5_27","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_27","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130151587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Random Forests with a Steepend Gini-Index Split Function and Feature Coherence Injection 具有陡坡基尼指数分裂函数和特征相干注入的随机森林
International Conference on Machine Learning for Networking Pub Date : 2019-12-03 DOI: 10.1007/978-3-030-45778-5_17
M. V. Gwetu, J. Tapamo, Serestina Viriri
{"title":"Random Forests with a Steepend Gini-Index Split Function and Feature Coherence Injection","authors":"M. V. Gwetu, J. Tapamo, Serestina Viriri","doi":"10.1007/978-3-030-45778-5_17","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_17","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122450568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信