Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








167 Hits in 5.8 sec

Attendee List

2020 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)  
for Developing Countries Nigeria Oladotun Okediran 143 Analysis and Design of 3-D Printed Fractal Triangular Antenna for Wireless Communications Applications Egypt Ashraf Ahmed 144 The Optimal  ...  System for Color Object Detection by Using Genetic Algorithm Optimization Algeria Fawzi Srairi 414 Bus Travel Times Prediction based on Real-Time Traffic Data Forecast using Artificial Neural Networks  ... 
doi:10.1109/icecce49384.2020.9179198 fatcat:ryry4suqzrfh3ch2v3veh4z6ei

COBAYN

Amir Hossein Ashouri, Giovanni Mariani, Gianluca Palermo, Eunjung Park, John Cavazos, Cristina Silvano
2016 ACM Transactions on Architecture and Code Optimization (TACO)  
The proposed framework is based on the application characterization done dynamically by using independent micro-architecture features and Bayesian networks.  ...  In addition, the paper compares Bayesian networks with respect to several state-of-the-art machine-learning models.  ...  and funded by the Netherlands Organization for Scientific Research (NWO), the Dutch Ministry of EL&I and the Province of Drenthe.  ... 
doi:10.1145/2928270 fatcat:emxem2a4ondk3kb37l424knrwa

Bridging Socially Enhanced Virtual Communities

Venugopal Rao
2013 IOSR Journal of Computer Engineering  
For the purpose of bringing the previously separated groups and also finding new relevant groups we introduced broker discovery concept that makes use of techniques and metrics pertaining to interactive  ...  The communication and interactions across the companies has become a common phenomenon.  ...  His suggestion about wireless networks in MANETs during the project was essential to the project's success.  ... 
doi:10.9790/0661-0940104 fatcat:zejgpenvqzb7rkchkznv5igfwm

Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning [article]

Mohammad Lotfollahi, Ramin Shirali Hossein Zade, Mahdi Jafari Siavoshani, Mohammdsadegh Saberian
2018 arXiv   pre-print
Our proposed scheme, called "Deep Packet," can handle both traffic characterization in which the network traffic is categorized into major classes (, FTP and P2P) and application identification in which  ...  Contrary to most of the current methods, Deep Packet can identify encrypted traffic and also distinguishes between VPN and non-VPN network traffic.  ...  Acknowledgements The authors would like to thank Farzad Ghasemi and Mehdi Kharrazi for their valuable discussions and feedback.  ... 
arXiv:1709.02656v3 fatcat:bpc2ndwlbbhsrapvrazkkdmxfi

Feature Selection Strategy for Network Intrusion Detection System (NIDS) Using Meerkat Clan Algorithm

Atheer R. Muhsen, Ghazwh G. Jumaa, Nadia F. AL Bakri, Ahmed T. Sadiq
2021 International Journal of Interactive Mobile Technologies  
Two datasets (NSL-KDD & UNSW-NB15) for Network Intrusion Detection Systems (NIDS) have been used to verify the performance of the proposed algorithm.  ...  The task of network security is to keep services available at all times by dealing with hacker attacks.  ...  These techniques are (J48 decision tree, support vector machine, decision table, and Bayesian network).  ... 
doi:10.3991/ijim.v15i16.24173 doaj:25f7f6bbe53c432aa2eaf5b39a234d7b fatcat:hbn7fs2in5dh3bqhwh5rgscg6i

New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System

D. Rajagopal, K. Thilakavalli, K. Syed Ali Fathima
2015 International Journal of Communication Technology for Social Networking Services  
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks.  ...  It might build reports for individual users, showing the list of internet sites visited, beside elaborate classification of web activity (downloading, reading text, viewing footage, observation movies,  ...  Intrusion Detection System observation network traffic for activity that falls inside the definition of prohibited activity for the network.  ... 
doi:10.21742/ijctsns.2015.3.1.02 fatcat:l52vreb2knhklb4wew2gk7l464

Efficient Detection of Botnet Traffic by Features Selection and Decision Trees

Javier Velasco-Mata, Victor Gonzalez-Castro, Eduardo Fidalgo Fernandez, Enrique Alegre
2021 IEEE Access  
Nowadays, the increasing number of devices connected to the Internet makes it necessary to analyze extensive network traffic data.  ...  INDEX TERMS Computational and artificial intelligence, computer applications, decision trees, machine learning algorithms, optimization methods.  ...  They used seven traffic captures from the Stratosphere IPS [52] , and they also tested more classifiers: Bayesian Network, NB, k-NN, Ada Boost, SVM, J48, RF, Ripper and PART.  ... 
doi:10.1109/access.2021.3108222 fatcat:zdfsgnfsjvcphcx5k4pswexjtm

New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System

D. Rajagopal, K. Thilakavalli, K. Syed Ali Fathima
2015 International Journal of Security and Its Applications  
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks.  ...  It might build reports for individual users, showing the list of internet sites visited, beside elaborate classification of web activity (downloading, reading text, viewing footage, observation movies,  ...  Intrusion Detection System observation network traffic for activity that falls inside the definition of prohibited activity for the network.  ... 
doi:10.14257/ijsia.2015.9.6.18 fatcat:paz2bzoaqfg37pz2dwpf3nvwpu

Speaker recognition from encrypted VoIP communications

L.A. Khan, M.S. Baig, Amr M. Youssef
2010 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Most of the voice over IP (VoIP) traffic is encrypted prior to its transmission over the Internet.  ...  Our experimental results show that the proposed techniques can correctly identify the actual speaker for 70-75% of the time among a group of 10 potential suspects.  ...  ) (Su et al., 2008) and the Bayesian network (Goldszmidt et al., 1977) classifiers.  ... 
doi:10.1016/j.diin.2009.10.001 fatcat:5qspukop4ff55lafnycnklolfa

Understanding and Assessment of Mission-Centric Key Cyber Terrains for joint Military Operations [article]

Álvaro Luis Martínez, Jorge Maestre Vidal, Victor A. Villagrá González
2021 arXiv   pre-print
These are correlated with the discoveries on the operational network and the asset vulnerabilities identified thorough the supported mission development.  ...  Information and Communications Technologies (ICT), up to their relevance at military tactical, operational and strategical views.  ...  Conf a = 3 Analogously, the network traffic Integrity (Int) indicates the degree in which the same mechanisms assure integrity, so the presence of TLS integrity flags and a Cipher Suite integrity secured  ... 
arXiv:2111.07005v1 fatcat:6cu46vxawragjo2vrcky2xseki

Detection and Prevention of Unknown Vulnerabilities on Enterprise IP Networks

Vincy Rose
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
Computer networks have long become the backbone of Enterprise Information System. The substantial share of the security problems are still encountered in Enterprise Network.  ...  To provide secure computer networks, it is necessary to measure the relative effectiveness of security solution in the network.  ...  During this process it will also determine a spanning tree for the graph. Finding the shortest path in a network is a commonly encountered problem. A network can be modeled by a graph.  ... 
doi:10.17762/ijritcc2321-8169.150286 fatcat:uvu2mkmy5rhb5j7c3mxf2774ki

CSITSS Proceedings 2020

2019 2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)  
Bayesian Networks, Artificial Neural Networks and Decision Trees were used as fraud detection techniques.  ...  The training pool consists of a pair of parsing trees: the first tree i.e. Natural Language Tree (NLT) for the sentence in natural language, the second tree i.e.  ...  The Octave plugin is implemented and tested by executing an use case of fuzzy inference system for traffic control.  ... 
doi:10.1109/csitss47250.2019.9031039 fatcat:yehi3bfgbva7xm74vp3a3i54pu

Cellular Automata and their Applications: A Review

Vasantha Murali Krishna, Sangita Mishra, Jagadish Gurrala
2022 International Journal of Computer Applications  
In this paper author reports a detail study on the convergence of the one-dimensional two-state 3 neighborhood asynchronous cellular automata (ACA) under null theory.  ...  In order to map favorably to optimal communication graphs for VLSI layouts the communication properties of CAs are noticed.  ...  For communication privacy or Concealment of data in data bank essentially required cryptography whose encryption may be achieved by building two types of ciphers such as Stream cipher as well Block cipher  ... 
doi:10.5120/ijca2022922010 fatcat:6hb7vjrjobeprokgozxjeu227e

Automatic License Plate Recognition using OpenCV

Pratiksha Jain, Neha Chopra, Vaishali Gupta
2014 International Journal of Computer Applications Technology and Research  
Automatic License Plate Recognition system is a real time embedded system which automatically recognizes the license plate of vehicles.  ...  Automatic license plate recognition (ALPR) has complex characteristics due to diverse effects such as of light and speed. Most of the ALPR systems are built using proprietary tools like Matlab.  ...  The methods of Bayesian network and K nearest neighbors algorithm (KNN) have been used for classification.  ... 
doi:10.7753/ijcatr0312.1001 fatcat:ystj5xcmxnf2hg5fwp2lsvp5ny

Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks [chapter]

Javier Lopez, Rodrigo Roman, Cristina Alcaraz
2009 Lecture Notes in Computer Science  
Note that, in terms of communications, the "cells" also behave as "nerves", since they transmit (wirelessly) the information sensed by other "cells" to the "brain".  ...  Finally, they can "subsist" because they are in most cases powered by batteries, and can survive in their deployment field for more than a year if their internal operations are optimized.  ...  The third author was funded by the Ministry of Education and Science of Spain under the "Programa Nacional de Formacion de Profesorado Universitario".  ... 
doi:10.1007/978-3-642-03829-7_10 fatcat:vke36pgqzfd5focrogfkf4ujxq
« Previous Showing results 1 — 15 out of 167 results