


default search action
MLN 2019: Paris, France
- Selma Boumerdassi, Éric Renault, Paul Mühlethaler:
Machine Learning for Networking - Second IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3-5, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12081, Springer 2020, ISBN 978-3-030-45777-8 - Yang Chen
, Junzhe Zhang
, Chai Kiat Yeo
:
Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model. 1-14 - François Alin, Amine Chemchem, Florent Nolot
, Olivier Flauzac, Michaël Krajecki:
Towards a Hierarchical Deep Learning Approach for Intrusion Detection. 15-27 - Menuka Perera Jayasuriya Kuranage, Kandaraj Piamrat
, Salima Hamma:
Network Traffic Classification Using Machine Learning for Software Defined Networks. 28-39 - Anurag Das, Samuel A. Ajila
, Chung-Horng Lung:
A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection. 40-57 - Alexis Bitaillou, Benoît Parrein
, Guillaume Andrieux:
Q-routing: From the Algorithm to the Routing Protocol. 58-69 - Eoin Rogers, John D. Kelleher
, Robert J. Ross
:
Language Model Co-occurrence Linking for Interleaved Activity Discovery. 70-84 - Golshan Famitafreshi, Cristina Cano:
Achieving Proportional Fairness in WiFi Networks via Bandit Convex Optimization. 85-98 - Ola Salman, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery. 99-116 - Diogo Ferreira
, Carlos R. Senna
, Paulo Salvador
, Luís Cortesão, Cristina Pires, Rui Pedro, Susana Sargento
:
Root Cause Analysis of Reduced Accessibility in 4G Networks. 117-133 - Achille Salaün, Anne Bouillard, Marc-Olivier Buob:
Space-Time Pattern Extraction in Alarm Logs for Network Diagnosis. 134-153 - Nageswara S. V. Rao, Neena Imam, Zhengchun Liu, Rajkumar Kettimuthu, Ian T. Foster:
Machine Learning Methods for Connection RTT and Loss Rate Estimation Using MPI Measurements Under Random Losses. 154-174 - Srikanth Bethu, B. Sankara Babu, K. Madhavi, P. Gopala Krishna:
Algorithm Selection and Model Evaluation in Application Design Using Machine Learning. 175-195 - Taku Wakui
, Takao Kondo
, Fumio Teraoka
:
GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN. 196-211 - Martín Panza, Diego Madariaga
, Javier Bustos-Jiménez:
Revealing User Behavior by Analyzing DNS Traffic. 212-226 - Jaekyung Yang
, Jong-Yeong Lee
, Myoungjin Choi
, Yeongin Joo
:
A New Approach to Determine the Optimal Number of Clusters Based on the Gap Statistic. 227-239 - Arnaud Rosay, Florent Carlier, Pascal Leroux:
MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset. 240-254 - Mandlenkosi Victor Gwetu, Jules-Raymond Tapamo, Serestina Viriri:
Random Forests with a Steepend Gini-Index Split Function and Feature Coherence Injection. 255-272 - Sai Prithvisingh Taurah, Jeshta Bhoyedhur, Roopesh Kevin Sungkur
:
Emotion-Based Adaptive Learning Systems. 273-286 - Vassia Bonandrini, Jean-François Bercher
, Nawel Zangar:
Machine Learning Methods for Anomaly Detection in IoT Networks, with Illustrations. 287-295 - Mariam Kiran, Bashir Mohammed, Nandini Krishnaswamy:
DeepRoute: Herding Elephant and Mice Flows with Reinforcement Learning. 296-314 - Onyekachi Nwamuo, Paulo Magella de Faria Quinan, Issa Traoré, Isaac Woungang, Abdulaziz Aldribi:
Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative. 315-332 - François Kasséné Gomis, Thierry Bouwmans
, Mamadou Samba Camara, Idy Diop:
Estimation of the Hidden Message Length in Steganography: A Deep Learning Approach. 333-341 - Dehao Wu, Maziar M. Nekovee
, Yue Wang:
An Adaptive Deep Learning Algorithm Based Autoencoder for Interference Channels. 342-354 - Ahmed Mejdoubi, Ouadoudi Zytoune, Hacène Fouchal
, Mohamed Ouadou:
A Learning Approach for Road Traffic Optimization in Urban Environments. 355-366 - Abdallah Sobehy, Éric Renault, Paul Mühlethaler:
CSI Based Indoor Localization Using Ensemble Neural Networks. 367-378 - Johan Mardini-Bovea, Emiro de la Hoz Franco, Diego Molina-Estren
, Paola Ariza Colpas, Andrés Ortiz, Julio Ortega, César A. Cárdenas R., Carlos Andrés Collazos Morales:
Bayesian Classifiers in Intrusion Detection Systems. 379-391 - Himanshu Gupta, Tanmay Girish Kulkarni, Lov Kumar
, Lalita Bhanu Murthy Neti:
A Novel Approach Towards Analysis of Attacker Behavior in DDoS Attacks. 392-402 - Hantanirina Felixie Rafalimanana, Jean Luc Razafindramintsa, Sylvain Cherrier, Thomas Mahatody, Laurent George, Victor Manantsoa:
Jason-RS, A Collaboration Between Agents and an IoT Platform. 403-413 - Nardjes Bouchemal, Aissa Serrar, Yehya Bouzeraa, Naila Bouchemal:
Scream to Survive(S2S): Intelligent System to Life-Saving in Disasters Relief. 414-430 - Imane Belabed, Mohammed Talibi Alaoui, El Miloud Jaâra, Abdelmajid Belabed:
Association Rules Algorithms for Data Mining Process Based on Multi Agent System. 431-443 - Benali Cherif
, Zaïdi Sahnoun, Ramdane Maamri, Nardjes Bouchemal:
Internet of Things: Security Between Challenges and Attacks. 444-460 - Juan Pablo Ospina, Joaquín F. Sánchez, Jorge Eduardo Ortiz Trivino, Carlos Andrés Collazos Morales, Paola Ariza Colpas:
Socially and Biologically Inspired Computing for Self-organizing Communications Networks. 461-484

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.