The Threat of Adversarial Attacks on Machine Learning in Network Security--A Survey

O Ibitoye, R Abou-Khamis, M Shehaby… - arXiv preprint arXiv …, 2019 - arxiv.org
Machine learning models have made many decision support systems to be faster, more
accurate, and more efficient. However, applications of machine learning in network security …

Text classification using the n-gram graph representation model over high frequency data streams

J Violos, K Tserpes, I Varlamis… - Frontiers in Applied …, 2018 - frontiersin.org
A prominent challenge in our information age is the classification over high frequency data
streams. In this research, we propose an innovative and high-accurate text stream …

Scalable architecture for Big Data financial analytics: user-defined functions vs. SQL

K Stockinger, N Bundi, J Heitz, W Breymann - Journal of Big Data, 2019 - Springer
Large financial organizations have hundreds of millions of financial contracts on their
balance sheets. Moreover, highly volatile financial markets and heterogeneous data sets …

Big Data architecture for intelligent maintenance: a focus on query processing and machine learning algorithms

C Lehmann, L Goren Huber, T Horisberger… - Journal of Big Data, 2020 - Springer
Exploiting available condition monitoring data of industrial machines for intelligent
maintenance purposes has been attracting attention in various application fields. Machine …

Detecting Anomalies in Time Series Using Kernel Density Approaches

R Frehner, K Wu, A Sim, J Kim, K Stockinger - IEEE Access, 2024 - ieeexplore.ieee.org
This paper introduces a novel anomaly detection approach tailored for time series data with
exclusive reliance on normal events during training. Our key innovation lies in the …

ML Hybrid Approach for Intrusion Detection in Networks

SR Deshmukh, C Mankar - 2022 IEEE IAS Global Conference …, 2022 - ieeexplore.ieee.org
As in today's developing network environment there is threat of new type of attacks daily in
the network. So, the network administration system is also needed to be updated regularly …

An Improved Intrusion Detection System Using Data Clustering and Support Vector Machine

P Namdev, C Gupta, S Dubey - International Conference on Advanced …, 2022 - Springer
In few recent years, data in the network is growing with a rapid speed for the security of
these data lots of tools, and algorithm is developed, but still, there will be need of better …

Klaidingų iškvietimų identifikavimas

E Zaranka, R Juozaitienė, T Krilavičius - Vilnius University Open Series, 2024 - zurnalai.vu.lt
Reagavimas į klaidingus iškvietimus trikdo ne tik sklandų saugos paslaugų veikimą, bet ir
eikvoja energijos išteklius, didina išmetamų ŠESD emisiją bei transporto atliekų susidarymą …

Big Data na gestão eficiente das Smart Grids. HDS: Uma Plataforma Híbrida, Dinâmica e Inteligente

EMPV Moreira - 2019 - gredos.usal.es
[POR] Nos últimos anos tem-se verificado um acréscimo exponencial de informação gerada
e disponibilizada a cada dia. Devido ao rápido avanço tecnológico (dispositivos móveis; …

[PDF][PDF] Κατηγοριοποίηση κειμένων χρησιμοποιώντας το μοντέλο αναπαράστασης γράφων Ν-γραμμάτων σε υψηλής συχνότητας ροής δεδομένων και εφαρμογές σε μέσα …

Ι Βιόλος - 2018 - dspace.lib.ntua.gr
Περίληψη Μια σηµαντική πρόκληση στην εποχή µας είναι η ταξινόµηση κειµένων σε ροές
δεδοµένων υψηλής συχνότητας. Σε αυτήν την έρευνα, προτείνουµε ένα καινοτόµο και υψηλής …