000 | 06051nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-030-45778-5 | ||
003 | DE-He213 | ||
005 | 20240423130203.0 | ||
007 | cr nn 008mamaa | ||
008 | 200419s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030457785 _9978-3-030-45778-5 |
||
024 | 7 |
_a10.1007/978-3-030-45778-5 _2doi |
|
050 | 4 | _aQA76.9.D343 | |
072 | 7 |
_aUNF _2bicssc |
|
072 | 7 |
_aUYQE _2bicssc |
|
072 | 7 |
_aCOM021030 _2bisacsh |
|
072 | 7 |
_aUNF _2thema |
|
072 | 7 |
_aUYQE _2thema |
|
082 | 0 | 4 |
_a006.312 _223 |
245 | 1 | 0 |
_aMachine Learning for Networking _h[electronic resource] : _bSecond IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3–5, 2019, Revised Selected Papers / _cedited by Selma Boumerdassi, Éric Renault, Paul Mühlethaler. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXIII, 486 p. 267 illus., 183 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v12081 |
|
505 | 0 | _aNetwork Anomaly Detection using Federated Deep Autoencoding Gaussian Mixture Model -- Towards a Hierarchical Deep Learning Approach for Intrusion Detection -- Network Trafic Classifi cation using Machine Learning for Software Defined Networks -- A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection -- Q-routing: from the algorithm to the routing protocol -- Language Model Co-occurrence Linking for Interleaved Activity Discovery -- Achieving Proportional Fairness in WiFi Networks via Bandit Convex Optimization -- Denoising Adversarial Autoencoder for Obfuscated Tra c Detection and Recovery -- Root Cause Analysis of Reduced Accessibility in 4G Networks -- Space-time pattern extraction in alarm logs for network diagnosis -- Machine Learning Methods for Connection RTT and Loss Rate Estimation Using MPI Measurements Under Random Losses -- Algorithm Selection and Model Evaluation in Application Design using Machine Learning -- GAMPAL: Anomaly Detection forInternet Backbone Tra c by Flow Prediction with LSTM-RNN -- Revealing User Behavior by Analyzing DNS Tra c -- A new approach to determine the optimal number of clusters based on the Gap statistic -- MLP4NIDS: an e cient MLP-based Network Intrusion Detection for CICIDS2017 dataset -- Random Forests with a Steepend Gini-Index Split Function and Feature Coherence Injection -- Emotion-based Adaptive Learning Systems -- Machine learning methods for anomaly detection in IoT networks, with illustrations -- DeepRoute: Herding Elephant and Mice Flows with Reinforcement Learning -- Arguments Against using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative -- Estimation of the Hidden Message Length in Steganography: A Deep Learning Approach -- An Adaptive Deep Learning Algorithm Based Autoencoder for Interference Channels -- A Learning Approach for Road Tra c Optimization in Urban Environments -- CSI based Indoor localization using Ensemble Neural Networks -- Bayesian Classi ersin Intrusion Detection Systems -- A Novel Approach towards Analysis of Attacker Behavior in DDoS Attacks -- Jason-RS, a Collaboration between Agents and an IoT Platform -- Scream to Survive(S2S): Intelligent System to Life-Saving in Disasters Relief -- Association Rules Algorithms for Data Mining Process Based on Multi Agent System -- Internet of Things: Security Between Challenges and Attacks -- Socially and biologically inspired computing for self-organizing communications networks. . | |
520 | _aThis book constitutes the thoroughly refereed proceedings of the Second International Conference on Machine Learning for Networking, MLN 2019, held in Paris, France, in December 2019. The 26 revised full papers included in the volume were carefully reviewed and selected from 75 submissions. They present and discuss new trends in deep and reinforcement learning, patternrecognition and classi cation for networks, machine learning for network slicingoptimization, 5G system, user behavior prediction, multimedia, IoT, securityand protection, optimization and new innovative machine learning methods, performanceanalysis of machine learning algorithms, experimental evaluations ofmachine learning, data mining in heterogeneous networks, distributed and decentralizedmachine learning algorithms, intelligent cloud-support communications,ressource allocation, energy-aware communications, software de ned networks,cooperative networks, positioning and navigation systems, wireless communications,wireless sensor networks, underwater sensor networks. | ||
650 | 0 | _aData mining. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aApplication software. | |
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aData Mining and Knowledge Discovery. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aData and Information Security. |
700 | 1 |
_aBoumerdassi, Selma. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aRenault, Éric. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMühlethaler, Paul. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030457778 |
776 | 0 | 8 |
_iPrinted edition: _z9783030457792 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v12081 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-45778-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c185982 _d185982 |