The Threat of Adversarial Attacks on Machine Learning in Network Security--A Survey
Machine learning models have made many decision support systems to be faster, more
accurate, and more efficient. However, applications of machine learning in network security …
accurate, and more efficient. However, applications of machine learning in network security …
Text classification using the n-gram graph representation model over high frequency data streams
A prominent challenge in our information age is the classification over high frequency data
streams. In this research, we propose an innovative and high-accurate text stream …
streams. In this research, we propose an innovative and high-accurate text stream …
Scalable architecture for Big Data financial analytics: user-defined functions vs. SQL
K Stockinger, N Bundi, J Heitz, W Breymann - Journal of Big Data, 2019 - Springer
Large financial organizations have hundreds of millions of financial contracts on their
balance sheets. Moreover, highly volatile financial markets and heterogeneous data sets …
balance sheets. Moreover, highly volatile financial markets and heterogeneous data sets …
Big Data architecture for intelligent maintenance: a focus on query processing and machine learning algorithms
C Lehmann, L Goren Huber, T Horisberger… - Journal of Big Data, 2020 - Springer
Exploiting available condition monitoring data of industrial machines for intelligent
maintenance purposes has been attracting attention in various application fields. Machine …
maintenance purposes has been attracting attention in various application fields. Machine …
Detecting Anomalies in Time Series Using Kernel Density Approaches
This paper introduces a novel anomaly detection approach tailored for time series data with
exclusive reliance on normal events during training. Our key innovation lies in the …
exclusive reliance on normal events during training. Our key innovation lies in the …
ML Hybrid Approach for Intrusion Detection in Networks
SR Deshmukh, C Mankar - 2022 IEEE IAS Global Conference …, 2022 - ieeexplore.ieee.org
As in today's developing network environment there is threat of new type of attacks daily in
the network. So, the network administration system is also needed to be updated regularly …
the network. So, the network administration system is also needed to be updated regularly …
An Improved Intrusion Detection System Using Data Clustering and Support Vector Machine
In few recent years, data in the network is growing with a rapid speed for the security of
these data lots of tools, and algorithm is developed, but still, there will be need of better …
these data lots of tools, and algorithm is developed, but still, there will be need of better …
Klaidingų iškvietimų identifikavimas
E Zaranka, R Juozaitienė, T Krilavičius - Vilnius University Open Series, 2024 - zurnalai.vu.lt
Reagavimas į klaidingus iškvietimus trikdo ne tik sklandų saugos paslaugų veikimą, bet ir
eikvoja energijos išteklius, didina išmetamų ŠESD emisiją bei transporto atliekų susidarymą …
eikvoja energijos išteklius, didina išmetamų ŠESD emisiją bei transporto atliekų susidarymą …
Big Data na gestão eficiente das Smart Grids. HDS: Uma Plataforma Híbrida, Dinâmica e Inteligente
EMPV Moreira - 2019 - gredos.usal.es
[POR] Nos últimos anos tem-se verificado um acréscimo exponencial de informação gerada
e disponibilizada a cada dia. Devido ao rápido avanço tecnológico (dispositivos móveis; …
e disponibilizada a cada dia. Devido ao rápido avanço tecnológico (dispositivos móveis; …
[PDF][PDF] Κατηγοριοποίηση κειμένων χρησιμοποιώντας το μοντέλο αναπαράστασης γράφων Ν-γραμμάτων σε υψηλής συχνότητας ροής δεδομένων και εφαρμογές σε μέσα …
Ι Βιόλος - 2018 - dspace.lib.ntua.gr
Περίληψη Μια σηµαντική πρόκληση στην εποχή µας είναι η ταξινόµηση κειµένων σε ροές
δεδοµένων υψηλής συχνότητας. Σε αυτήν την έρευνα, προτείνουµε ένα καινοτόµο και υψηλής …
δεδοµένων υψηλής συχνότητας. Σε αυτήν την έρευνα, προτείνουµε ένα καινοτόµο και υψηλής …