A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Attendee List
2020
2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)
for Developing
Countries
Nigeria
Oladotun Okediran
143
Analysis and Design of 3-D Printed Fractal Triangular Antenna for Wireless
Communications Applications
Egypt
Ashraf Ahmed
144
The Optimal ...
System for Color Object Detection by Using Genetic
Algorithm Optimization
Algeria
Fawzi Srairi
414
Bus Travel Times Prediction based on Real-Time Traffic Data Forecast using Artificial
Neural Networks ...
doi:10.1109/icecce49384.2020.9179198
fatcat:ryry4suqzrfh3ch2v3veh4z6ei
The proposed framework is based on the application characterization done dynamically by using independent micro-architecture features and Bayesian networks. ...
In addition, the paper compares Bayesian networks with respect to several state-of-the-art machine-learning models. ...
and funded by the Netherlands Organization for Scientific Research (NWO), the Dutch Ministry of EL&I and the Province of Drenthe. ...
doi:10.1145/2928270
fatcat:emxem2a4ondk3kb37l424knrwa
Bridging Socially Enhanced Virtual Communities
2013
IOSR Journal of Computer Engineering
For the purpose of bringing the previously separated groups and also finding new relevant groups we introduced broker discovery concept that makes use of techniques and metrics pertaining to interactive ...
The communication and interactions across the companies has become a common phenomenon. ...
His suggestion about wireless networks in MANETs during the project was essential to the project's success. ...
doi:10.9790/0661-0940104
fatcat:zejgpenvqzb7rkchkznv5igfwm
Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning
[article]
2018
arXiv
pre-print
Our proposed scheme, called "Deep Packet," can handle both traffic characterization in which the network traffic is categorized into major classes (, FTP and P2P) and application identification in which ...
Contrary to most of the current methods, Deep Packet can identify encrypted traffic and also distinguishes between VPN and non-VPN network traffic. ...
Acknowledgements The authors would like to thank Farzad Ghasemi and Mehdi Kharrazi for their valuable discussions and feedback. ...
arXiv:1709.02656v3
fatcat:bpc2ndwlbbhsrapvrazkkdmxfi
Feature Selection Strategy for Network Intrusion Detection System (NIDS) Using Meerkat Clan Algorithm
2021
International Journal of Interactive Mobile Technologies
Two datasets (NSL-KDD & UNSW-NB15) for Network Intrusion Detection Systems (NIDS) have been used to verify the performance of the proposed algorithm. ...
The task of network security is to keep services available at all times by dealing with hacker attacks. ...
These techniques are (J48 decision tree, support vector machine, decision table, and Bayesian network). ...
doi:10.3991/ijim.v15i16.24173
doaj:25f7f6bbe53c432aa2eaf5b39a234d7b
fatcat:hbn7fs2in5dh3bqhwh5rgscg6i
New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System
2015
International Journal of Communication Technology for Social Networking Services
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. ...
It might build reports for individual users, showing the list of internet sites visited, beside elaborate classification of web activity (downloading, reading text, viewing footage, observation movies, ...
Intrusion Detection System observation network traffic for activity that falls inside the definition of prohibited activity for the network. ...
doi:10.21742/ijctsns.2015.3.1.02
fatcat:l52vreb2knhklb4wew2gk7l464
Efficient Detection of Botnet Traffic by Features Selection and Decision Trees
2021
IEEE Access
Nowadays, the increasing number of devices connected to the Internet makes it necessary to analyze extensive network traffic data. ...
INDEX TERMS Computational and artificial intelligence, computer applications, decision trees, machine learning algorithms, optimization methods. ...
They used seven traffic captures from the Stratosphere IPS [52] , and they also tested more classifiers: Bayesian Network, NB, k-NN, Ada Boost, SVM, J48, RF, Ripper and PART. ...
doi:10.1109/access.2021.3108222
fatcat:zdfsgnfsjvcphcx5k4pswexjtm
New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System
2015
International Journal of Security and Its Applications
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. ...
It might build reports for individual users, showing the list of internet sites visited, beside elaborate classification of web activity (downloading, reading text, viewing footage, observation movies, ...
Intrusion Detection System observation network traffic for activity that falls inside the definition of prohibited activity for the network. ...
doi:10.14257/ijsia.2015.9.6.18
fatcat:paz2bzoaqfg37pz2dwpf3nvwpu
Speaker recognition from encrypted VoIP communications
2010
Digital Investigation. The International Journal of Digital Forensics and Incident Response
Most of the voice over IP (VoIP) traffic is encrypted prior to its transmission over the Internet. ...
Our experimental results show that the proposed techniques can correctly identify the actual speaker for 70-75% of the time among a group of 10 potential suspects. ...
) (Su et al., 2008) and the Bayesian network (Goldszmidt et al., 1977) classifiers. ...
doi:10.1016/j.diin.2009.10.001
fatcat:5qspukop4ff55lafnycnklolfa
Understanding and Assessment of Mission-Centric Key Cyber Terrains for joint Military Operations
[article]
2021
arXiv
pre-print
These are correlated with the discoveries on the operational network and the asset vulnerabilities identified thorough the supported mission development. ...
Information and Communications Technologies (ICT), up to their relevance at military tactical, operational and strategical views. ...
Conf a = 3 Analogously, the network traffic Integrity (Int) indicates the degree in which the same mechanisms assure integrity, so the presence of TLS integrity flags and a Cipher Suite integrity secured ...
arXiv:2111.07005v1
fatcat:6cu46vxawragjo2vrcky2xseki
Detection and Prevention of Unknown Vulnerabilities on Enterprise IP Networks
2015
International Journal on Recent and Innovation Trends in Computing and Communication
Computer networks have long become the backbone of Enterprise Information System. The substantial share of the security problems are still encountered in Enterprise Network. ...
To provide secure computer networks, it is necessary to measure the relative effectiveness of security solution in the network. ...
During this process it will also determine a spanning tree for the graph. Finding the shortest path in a network is a commonly encountered problem. A network can be modeled by a graph. ...
doi:10.17762/ijritcc2321-8169.150286
fatcat:uvu2mkmy5rhb5j7c3mxf2774ki
CSITSS Proceedings 2020
2019
2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)
Bayesian Networks, Artificial Neural Networks and Decision Trees were used as fraud detection techniques. ...
The training pool consists of a pair of parsing trees: the first tree i.e. Natural Language Tree (NLT) for the sentence in natural language, the second tree i.e. ...
The Octave plugin is implemented and tested by executing an use case of fuzzy inference system for traffic control. ...
doi:10.1109/csitss47250.2019.9031039
fatcat:yehi3bfgbva7xm74vp3a3i54pu
Cellular Automata and their Applications: A Review
2022
International Journal of Computer Applications
In this paper author reports a detail study on the convergence of the one-dimensional two-state 3 neighborhood asynchronous cellular automata (ACA) under null theory. ...
In order to map favorably to optimal communication graphs for VLSI layouts the communication properties of CAs are noticed. ...
For communication privacy or Concealment of data in data bank essentially required cryptography whose encryption may be achieved by building two types of ciphers such as Stream cipher as well Block cipher ...
doi:10.5120/ijca2022922010
fatcat:6hb7vjrjobeprokgozxjeu227e
Automatic License Plate Recognition using OpenCV
2014
International Journal of Computer Applications Technology and Research
Automatic License Plate Recognition system is a real time embedded system which automatically recognizes the license plate of vehicles. ...
Automatic license plate recognition (ALPR) has complex characteristics due to diverse effects such as of light and speed. Most of the ALPR systems are built using proprietary tools like Matlab. ...
The methods of Bayesian network and K nearest neighbors algorithm (KNN) have been used for classification. ...
doi:10.7753/ijcatr0312.1001
fatcat:ystj5xcmxnf2hg5fwp2lsvp5ny
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks
[chapter]
2009
Lecture Notes in Computer Science
Note that, in terms of communications, the "cells" also behave as "nerves", since they transmit (wirelessly) the information sensed by other "cells" to the "brain". ...
Finally, they can "subsist" because they are in most cases powered by batteries, and can survive in their deployment field for more than a year if their internal operations are optimized. ...
The third author was funded by the Ministry of Education and Science of Spain under the "Programa Nacional de Formacion de Profesorado Universitario". ...
doi:10.1007/978-3-642-03829-7_10
fatcat:vke36pgqzfd5focrogfkf4ujxq
« Previous
Showing results 1 — 15 out of 167 results