A survey on application of machine learning for Internet of Things
Abstract Internet of Things (IoT) has become an important network paradigm and there are
lots of smart devices connected by IoT. IoT systems are producing massive data and thus …
lots of smart devices connected by IoT. IoT systems are producing massive data and thus …
A survey of itemset mining
P Fournier‐Viger, JCW Lin, B Vo, TT Chi… - … : Data Mining and …, 2017 - Wiley Online Library
Itemset mining is an important subfield of data mining, which consists of discovering
interesting and useful patterns in transaction databases. The traditional task of frequent …
interesting and useful patterns in transaction databases. The traditional task of frequent …
Event labeling combining ensemble detectors and background knowledge
H Fanaee-T, J Gama - Progress in Artificial Intelligence, 2014 - Springer
Event labeling is the process of marking events in unlabeled data. Traditionally, this is done
by involving one or more human experts through an expensive and time-consuming task. In …
by involving one or more human experts through an expensive and time-consuming task. In …
An entropy-based network anomaly detection method
Data mining is an interdisciplinary subfield of computer science involving methods at the
intersection of artificial intelligence, machine learning and statistics. One of the data mining …
intersection of artificial intelligence, machine learning and statistics. One of the data mining …
Opprentice: Towards practical and automatic anomaly detection through machine learning
Closely monitoring service performance and detecting anomalies are critical for Internet-
based services. However, even though dozens of anomaly detectors have been proposed …
based services. However, even though dozens of anomaly detectors have been proposed …
Logcluster-a data clustering and pattern mining algorithm for event logs
R Vaarandi, M Pihelgas - 2015 11th International conference …, 2015 - ieeexplore.ieee.org
Modern IT systems often produce large volumes of event logs, and event pattern discovery is
an important log management task. For this purpose, data mining methods have been …
an important log management task. For this purpose, data mining methods have been …
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
As more and more Internet-based attacks arise, organizations are responding by deploying
an assortment of security products that generate situational intelligence in the form of logs …
an assortment of security products that generate situational intelligence in the form of logs …
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of
research has focused on methods for detecting and mitigating the effects of botnets. Two of …
research has focused on methods for detecting and mitigating the effects of botnets. Two of …
Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult
due to the lack of ground truth. The goal of the present article is to assist researchers in the …
due to the lack of ground truth. The goal of the present article is to assist researchers in the …
[PDF][PDF] {SEPIA}:{Privacy-Preserving} aggregation of {Multi-Domain} network events and statistics
M Burkhart, M Strasser, D Many… - 19th USENIX Security …, 2010 - usenix.org
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data
of multiple parties. Although MPC has been studied substantially, building solutions that are …
of multiple parties. Although MPC has been studied substantially, building solutions that are …