default search action
MLN 2019: Paris, France
- Selma Boumerdassi, Éric Renault, Paul Mühlethaler:
Machine Learning for Networking - Second IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3-5, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12081, Springer 2020, ISBN 978-3-030-45777-8 - Yang Chen, Junzhe Zhang, Chai Kiat Yeo:
Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model. 1-14 - François Alin, Amine Chemchem, Florent Nolot, Olivier Flauzac, Michaël Krajecki:
Towards a Hierarchical Deep Learning Approach for Intrusion Detection. 15-27 - Menuka Perera Jayasuriya Kuranage, Kandaraj Piamrat, Salima Hamma:
Network Traffic Classification Using Machine Learning for Software Defined Networks. 28-39 - Anurag Das, Samuel A. Ajila, Chung-Horng Lung:
A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection. 40-57 - Alexis Bitaillou, Benoît Parrein, Guillaume Andrieux:
Q-routing: From the Algorithm to the Routing Protocol. 58-69 - Eoin Rogers, John D. Kelleher, Robert J. Ross:
Language Model Co-occurrence Linking for Interleaved Activity Discovery. 70-84 - Golshan Famitafreshi, Cristina Cano:
Achieving Proportional Fairness in WiFi Networks via Bandit Convex Optimization. 85-98 - Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery. 99-116 - Diogo Ferreira, Carlos R. Senna, Paulo Salvador, Luís Cortesão, Cristina Pires, Rui Pedro, Susana Sargento:
Root Cause Analysis of Reduced Accessibility in 4G Networks. 117-133 - Achille Salaün, Anne Bouillard, Marc-Olivier Buob:
Space-Time Pattern Extraction in Alarm Logs for Network Diagnosis. 134-153 - Nageswara S. V. Rao, Neena Imam, Zhengchun Liu, Rajkumar Kettimuthu, Ian T. Foster:
Machine Learning Methods for Connection RTT and Loss Rate Estimation Using MPI Measurements Under Random Losses. 154-174 - Srikanth Bethu, B. Sankara Babu, K. Madhavi, P. Gopala Krishna:
Algorithm Selection and Model Evaluation in Application Design Using Machine Learning. 175-195 - Taku Wakui, Takao Kondo, Fumio Teraoka:
GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN. 196-211 - Martín Panza, Diego Madariaga, Javier Bustos-Jiménez:
Revealing User Behavior by Analyzing DNS Traffic. 212-226 - Jaekyung Yang, Jong-Yeong Lee, Myoungjin Choi, Yeongin Joo:
A New Approach to Determine the Optimal Number of Clusters Based on the Gap Statistic. 227-239 - Arnaud Rosay, Florent Carlier, Pascal Leroux:
MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset. 240-254 - Mandlenkosi Victor Gwetu, Jules-Raymond Tapamo, Serestina Viriri:
Random Forests with a Steepend Gini-Index Split Function and Feature Coherence Injection. 255-272 - Sai Prithvisingh Taurah, Jeshta Bhoyedhur, Roopesh Kevin Sungkur:
Emotion-Based Adaptive Learning Systems. 273-286 - Vassia Bonandrini, Jean-François Bercher, Nawel Zangar:
Machine Learning Methods for Anomaly Detection in IoT Networks, with Illustrations. 287-295 - Mariam Kiran, Bashir Mohammed, Nandini Krishnaswamy:
DeepRoute: Herding Elephant and Mice Flows with Reinforcement Learning. 296-314 - Onyekachi Nwamuo, Paulo Magella de Faria Quinan, Issa Traoré, Isaac Woungang, Abdulaziz Aldribi:
Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative. 315-332 - François Kasséné Gomis, Thierry Bouwmans, Mamadou Samba Camara, Idy Diop:
Estimation of the Hidden Message Length in Steganography: A Deep Learning Approach. 333-341 - Dehao Wu, Maziar M. Nekovee, Yue Wang:
An Adaptive Deep Learning Algorithm Based Autoencoder for Interference Channels. 342-354 - Ahmed Mejdoubi, Ouadoudi Zytoune, Hacène Fouchal, Mohamed Ouadou:
A Learning Approach for Road Traffic Optimization in Urban Environments. 355-366 - Abdallah Sobehy, Éric Renault, Paul Mühlethaler:
CSI Based Indoor Localization Using Ensemble Neural Networks. 367-378 - Johan Mardini-Bovea, Emiro de la Hoz Franco, Diego Molina-Estren, Paola Ariza Colpas, Andrés Ortiz, Julio Ortega, César A. Cárdenas R., Carlos Andrés Collazos Morales:
Bayesian Classifiers in Intrusion Detection Systems. 379-391 - Himanshu Gupta, Tanmay Girish Kulkarni, Lov Kumar, Lalita Bhanu Murthy Neti:
A Novel Approach Towards Analysis of Attacker Behavior in DDoS Attacks. 392-402 - Hantanirina Felixie Rafalimanana, Jean Luc Razafindramintsa, Sylvain Cherrier, Thomas Mahatody, Laurent George, Victor Manantsoa:
Jason-RS, A Collaboration Between Agents and an IoT Platform. 403-413 - Nardjes Bouchemal, Aissa Serrar, Yehya Bouzeraa, Naila Bouchemal:
Scream to Survive(S2S): Intelligent System to Life-Saving in Disasters Relief. 414-430 - Imane Belabed, Mohammed Talibi Alaoui, El Miloud Jaâra, Abdelmajid Belabed:
Association Rules Algorithms for Data Mining Process Based on Multi Agent System. 431-443 - Benali Cherif, Zaïdi Sahnoun, Ramdane Maamri, Nardjes Bouchemal:
Internet of Things: Security Between Challenges and Attacks. 444-460 - Juan Pablo Ospina, Joaquín F. Sánchez, Jorge Eduardo Ortiz Trivino, Carlos Andrés Collazos Morales, Paola Ariza Colpas:
Socially and Biologically Inspired Computing for Self-organizing Communications Networks. 461-484
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.