Table of Contents
|
Machine Learning for Networking. Selma Boumerdassi, Eric Renault, Paul Muhlethaler |
Front Matter |
Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model Yang Chen, Junzhe Zhang, Chai Yeo |
1-14 |
Towards a Hierarchical Deep Learning Approach for Intrusion Detection Francois Alin, Amine Chemchem, Florent Nolot, Olivier Flauzac, Michaël Krajecki |
15-27 |
Network Traffic Classification Using Machine Learning for Software Defined Networks Menuka Perera Jayasuriya Kuranage, Kandaraj Piamrat, Salima Hamma |
28-39 |
A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection Anurag Das, Samuel Ajila, Chung-Horng Lung |
40-57 |
Q-routing: from the algorithm to the routing protocol Alexis Bitaillou, Benoît Parrein, Guillaume Andrieux |
58-69 |
Language Model Co-occurrence Linking for Interleaved Activity Discovery Eoin Rogers, John Kelleher, Robert Ross |
70-84 |
Achieving Proportional Fairness in WiFi Networks via Bandit Convex Optimization Golshan Famitafreshi, Cristina Cano |
85-98 |
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery Ola Salman, Imad Elhajj, Ayman Kayssi, Ali Chehab |
99-116 |
Root Cause Analysis of Reduced Accessibility in 4G Networks Diogo Ferreira, Carlos Senna, Paulo Salvador, Luís Cortesão, Cristina Pires, Rui Pedro, Susana Sargento |
117-133 |
Space-time pattern extraction in alarm logs for network diagnosis Achille Salaün, Anne Bouillard, Marc-Olivier Buob |
134-153 |
Machine Learning Methods for Connection RTT and Loss Rate Estimation Using MPI Measurements Under Random Losses Nageswara Rao, Neena Imam, Zhengchun Liu, Rajkumar Kettimuthu, Ian Foster |
154-174 |
Algorithm Selection and Model Evaluation in Application Design Using Machine Learning Srikanth Bethu, B. Sankara Babu, K. Madhavi, P. Gopala Krishna |
175-195 |
GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN Taku Wakui, Takao Kondo, Fumio Teraoka |
196-211 |
Revealing User Behavior by Analyzing DNS Traffic Martín Panza, Diego Madariaga, Javier Bustos-Jiménez |
212-226 |
A New Approach to Determine the Optimal Number of Clusters Based on the Gap Statistic Jaekyung Yang, Jong-Yeong Lee, Myoungjin Choi, Yeongin Joo |
227-239 |
MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset Arnaud Rosay, Florent Carlier, Pascal Leroux |
240-254 |
Random Forests with a Steepend Gini-Index Split Function and Feature Coherence Injection Mandlenkosi Gwetu, Jules-Raymond Tapamo, Serestina Viriri |
255-272 |
Emotion-Based Adaptive Learning Systems Sai Taurah, Jeshta Bhoyedhur, Roopesh Sungkur |
273-286 |
Machine learning methods for anomaly detection in IoT networks, with illustrations Vassia Bonandrini, Jean-François Bercher, Nawel Zangar |
287-295 |
DeepRoute: Herding Elephant and Mice Flows with Reinforcement Learning Mariam Kiran, Bashir Mohammed, Nandini Krishnaswamy |
296-314 |
Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative Paulo Faria Quinan, Issa Traore, Isaac Woungang, Abdulaziz Aldribi, Onyekachi Nwamuo |
315-332 |
Estimation of the Hidden Message Length in Steganography: A Deep Learning Approach François Kasséné Gomis, Thierry Bouwmans, Mamadou Samba Camara, Idy Diop |
333-341 |
An Adaptive Deep Learning Algorithm Based Autoencoder for Interference Channels Dehao Wu, Maziar Nekovee, Yue Wang |
342-354 |
A Learning Approach for Road Traffic Optimization in Urban Environments Ahmed Mejdoubi, Ouadoudi Zytoune, Hacene Fouchal, Mohamed Ouadou |
355-366 |
CSI based indoor localization using Ensemble Neural Networks Abdallah Sobehy, Eric Renault, Paul Muhlethaler |
367-378 |
Bayesian Classifiers in Intrusion Detection Systems Mardini-Bovea Johan, De-La-Hoz-Franco Emiro, Molina-Estren Diego, Paola Ariza-Colpas, Ortíz Andrés, Ortega Julio, César Cárdenas, Carlos Collazos-Morales |
379-391 |
A Novel Approach Towards Analysis of Attacker Behavior in DDoS Attacks Himanshu Gupta, Tanmay Kulkarni, Lov Kumar, Neti Murthy |
392-402 |
Jason-RS, A Collaboration Between Agents and an IoT Platform Hantanirina Rafalimanana, Jean Razafindramintsa, Sylvain Cherrier, Thomas Mahatody, Laurent George, Victor Manantsoa |
403-413 |
Scream to Survive(S2S): Intelligent System to Life-Saving in Disasters Relief Nardjes Bouchemal, Aissa Serrar, Yehya Bouzeraa, Naila Bouchmemal |
414-430 |
Association Rules Algorithms for Data Mining Process Based on Multi Agent System Imane Belabed, Mohammed Talibi Alaoui, Jaara El Miloud, Abdelmajid Belabed |
431-443 |
Internet of Things: Security Between Challenges and Attacks Benali Cherif, Zaidi Sahnoun, Maamri Ramdane, Bouchemal Nardjes |
444-460 |
Socially and Biologically Inspired Computing for Self-organizing Communications Networks Juan Ospina, Joaquín Sánchez, Jorge Ortiz, Carlos Collazos-Morales, Paola Ariza-Colpas |
461-484 |