{"title":"A Regret Minimization Approach to Frameless Irregular Repetition Slotted Aloha: IRSA-RM","authors":"Iman Hmedoush, C. Adjih, P. Mühlethaler","doi":"10.1007/978-3-030-70866-5_5","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_5","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
El-Heithem Mohammedi, E. Lavinal, Guillaume Fleury
{"title":"Configuration Faults Detection in IP Virtual Private Networks Based on Machine Learning","authors":"El-Heithem Mohammedi, E. Lavinal, Guillaume Fleury","doi":"10.1007/978-3-030-70866-5_3","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_3","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CSI Based Indoor Localization Using Ensemble Neural Networks","authors":"Abdallah Sobehy, É. Renault, P. Mühlethaler","doi":"10.1007/978-3-030-45778-5_25","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_25","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121148270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model","authors":"Y. Chen, Junzhe Zhang, C. Yeo","doi":"10.1007/978-3-030-45778-5_1","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_1","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery","authors":"O. Salman, I. Elhajj, A. Kayssi, A. Chehab","doi":"10.1007/978-3-030-45778-5_8","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_8","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132976169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Onyekachi Nwamuo, Paulo Magella de Faria Quinan, I. Traoré, I. Woungang, Abdulaziz Aldribi
{"title":"Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative","authors":"Onyekachi Nwamuo, Paulo Magella de Faria Quinan, I. Traoré, I. Woungang, Abdulaziz Aldribi","doi":"10.1007/978-3-030-45778-5_21","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_21","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Martín Panza, Diego Madariaga, Javier Bustos-Jiménez
{"title":"Revealing User Behavior by Analyzing DNS Traffic","authors":"Martín Panza, Diego Madariaga, Javier Bustos-Jiménez","doi":"10.1007/978-3-030-45778-5_14","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_14","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hantanirina Felixie, J. Razafindramintsa, Sylvain Cherrier, Thomas Mahatody, L. George, Victor Manantsoa
{"title":"Jason-RS, a Collaboration between Agents and an IoT Platform","authors":"Hantanirina Felixie, J. Razafindramintsa, Sylvain Cherrier, Thomas Mahatody, L. George, Victor Manantsoa","doi":"10.1007/978-3-030-45778-5_28","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_28","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Himanshu Gupta, T. Kulkarni, L. Kumar, Lalita Bhanu Murthy Neti
{"title":"A Novel Approach Towards Analysis of Attacker Behavior in DDoS Attacks","authors":"Himanshu Gupta, T. Kulkarni, L. Kumar, Lalita Bhanu Murthy Neti","doi":"10.1007/978-3-030-45778-5_27","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_27","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130151587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Random Forests with a Steepend Gini-Index Split Function and Feature Coherence Injection","authors":"M. V. Gwetu, J. Tapamo, Serestina Viriri","doi":"10.1007/978-3-030-45778-5_17","DOIUrl":"https://doi.org/10.1007/978-3-030-45778-5_17","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122450568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}