Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Machine learning for networkingsecon...
~
(1998 :)
Machine learning for networkingsecond IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3-5, 2019 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Machine learning for networkingedited by Selma Boumerdassi, Eric Renault, Paul Muhlethaler.
Reminder of title:
second IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3-5, 2019 : revised selected papers /
remainder title:
MLN 2019
other author:
Boumerdassi, Selma.
corporate name:
Published:
Cham :Springer International Publishing :2020.
Description:
xiii, 486 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Machine learningCongresses.
Online resource:
https://doi.org/10.1007/978-3-030-45778-5
ISBN:
9783030457785$q(electronic bk.)
Machine learning for networkingsecond IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3-5, 2019 : revised selected papers /
Machine learning for networking
second IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3-5, 2019 : revised selected papers /[electronic resource] :MLN 2019edited by Selma Boumerdassi, Eric Renault, Paul Muhlethaler. - Cham :Springer International Publishing :2020. - xiii, 486 p. :ill., digital ;24 cm. - Lecture notes in computer science,120810302-9743 ;. - Lecture notes in computer science ;4891..
Network Anomaly Detection using Federated Deep Autoencoding Gaussian Mixture Model -- Towards a Hierarchical Deep Learning Approach for Intrusion Detection -- Network Trafic Classifi cation using Machine Learning for Software Defined Networks -- A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection -- Q-routing: from the algorithm to the routing protocol -- Language Model Co-occurrence Linking for Interleaved Activity Discovery -- Achieving Proportional Fairness in WiFi Networks via Bandit Convex Optimization -- Denoising Adversarial Autoencoder for Obfuscated Tra c Detection and Recovery -- Root Cause Analysis of Reduced Accessibility in 4G Networks -- Space-time pattern extraction in alarm logs for network diagnosis -- Machine Learning Methods for Connection RTT and Loss Rate Estimation Using MPI Measurements Under Random Losses -- Algorithm Selection and Model Evaluation in Application Design using Machine Learning -- GAMPAL: Anomaly Detection for Internet Backbone Tra c by Flow Prediction with LSTM-RNN -- Revealing User Behavior by Analyzing DNS Tra c -- A new approach to determine the optimal number of clusters based on the Gap statistic -- MLP4NIDS: an e cient MLP-based Network Intrusion Detection for CICIDS2017 dataset -- Random Forests with a Steepend Gini-Index Split Function and Feature Coherence Injection -- Emotion-based Adaptive Learning Systems -- Machine learning methods for anomaly detection in IoT networks, with illustrations -- DeepRoute: Herding Elephant and Mice Flows with Reinforcement Learning -- Arguments Against using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative -- Estimation of the Hidden Message Length in Steganography: A Deep Learning Approach -- An Adaptive Deep Learning Algorithm Based Autoencoder for Interference Channels -- A Learning Approach for Road Tra c Optimization in Urban Environments -- CSI based Indoor localization using Ensemble Neural Networks -- Bayesian Classi ers in Intrusion Detection Systems -- A Novel Approach towards Analysis of Attacker Behavior in DDoS Attacks -- Jason-RS, a Collaboration between Agents and an IoT Platform -- Scream to Survive(S2S): Intelligent System to Life-Saving in Disasters Relief -- Association Rules Algorithms for Data Mining Process Based on Multi Agent System -- Internet of Things: Security Between Challenges and Attacks -- Socially and biologically inspired computing for self-organizing communications networks.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Machine Learning for Networking, MLN 2019, held in Paris, France, in December 2019. The 26 revised full papers included in the volume were carefully reviewed and selected from 75 submissions. They present and discuss new trends in deep and reinforcement learning, patternrecognition and classi cation for networks, machine learning for network slicingoptimization, 5G system, user behavior prediction, multimedia, IoT, securityand protection, optimization and new innovative machine learning methods, performanceanalysis of machine learning algorithms, experimental evaluations ofmachine learning, data mining in heterogeneous networks, distributed and decentralizedmachine learning algorithms, intelligent cloud-support communications,ressource allocation, energy-aware communications, software de ned networks,cooperative networks, positioning and navigation systems, wireless communications,wireless sensor networks, underwater sensor networks.
ISBN: 9783030457785$q(electronic bk.)
Standard No.: 10.1007/978-3-030-45778-5doiSubjects--Topical Terms:
384498
Machine learning
--Congresses.
LC Class. No.: Q325.5 / .I57 2019
Dewey Class. No.: 004.6
Machine learning for networkingsecond IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3-5, 2019 : revised selected papers /
LDR
:04860nmm a2200373 a 4500
001
571796
003
DE-He213
005
20200422005501.0
006
m d
007
cr nn 008maaau
008
200922s2020 sz s 0 eng d
020
$a
9783030457785$q(electronic bk.)
020
$a
9783030457778$q(paper)
024
7
$a
10.1007/978-3-030-45778-5
$2
doi
035
$a
978-3-030-45778-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q325.5
$b
.I57 2019
072
7
$a
UNF
$2
bicssc
072
7
$a
COM021030
$2
bisacsh
072
7
$a
UNF
$2
thema
072
7
$a
UYQE
$2
thema
082
0 4
$a
004.6
$2
23
090
$a
Q325.5
$b
.I51 2019
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Machine learning for networking
$h
[electronic resource] :
$b
second IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3-5, 2019 : revised selected papers /
$c
edited by Selma Boumerdassi, Eric Renault, Paul Muhlethaler.
246
3
$a
MLN 2019
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xiii, 486 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12081
490
1
$a
Information systems and applications, incl. internet/web, and HCI
505
0
$a
Network Anomaly Detection using Federated Deep Autoencoding Gaussian Mixture Model -- Towards a Hierarchical Deep Learning Approach for Intrusion Detection -- Network Trafic Classifi cation using Machine Learning for Software Defined Networks -- A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection -- Q-routing: from the algorithm to the routing protocol -- Language Model Co-occurrence Linking for Interleaved Activity Discovery -- Achieving Proportional Fairness in WiFi Networks via Bandit Convex Optimization -- Denoising Adversarial Autoencoder for Obfuscated Tra c Detection and Recovery -- Root Cause Analysis of Reduced Accessibility in 4G Networks -- Space-time pattern extraction in alarm logs for network diagnosis -- Machine Learning Methods for Connection RTT and Loss Rate Estimation Using MPI Measurements Under Random Losses -- Algorithm Selection and Model Evaluation in Application Design using Machine Learning -- GAMPAL: Anomaly Detection for Internet Backbone Tra c by Flow Prediction with LSTM-RNN -- Revealing User Behavior by Analyzing DNS Tra c -- A new approach to determine the optimal number of clusters based on the Gap statistic -- MLP4NIDS: an e cient MLP-based Network Intrusion Detection for CICIDS2017 dataset -- Random Forests with a Steepend Gini-Index Split Function and Feature Coherence Injection -- Emotion-based Adaptive Learning Systems -- Machine learning methods for anomaly detection in IoT networks, with illustrations -- DeepRoute: Herding Elephant and Mice Flows with Reinforcement Learning -- Arguments Against using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative -- Estimation of the Hidden Message Length in Steganography: A Deep Learning Approach -- An Adaptive Deep Learning Algorithm Based Autoencoder for Interference Channels -- A Learning Approach for Road Tra c Optimization in Urban Environments -- CSI based Indoor localization using Ensemble Neural Networks -- Bayesian Classi ers in Intrusion Detection Systems -- A Novel Approach towards Analysis of Attacker Behavior in DDoS Attacks -- Jason-RS, a Collaboration between Agents and an IoT Platform -- Scream to Survive(S2S): Intelligent System to Life-Saving in Disasters Relief -- Association Rules Algorithms for Data Mining Process Based on Multi Agent System -- Internet of Things: Security Between Challenges and Attacks -- Socially and biologically inspired computing for self-organizing communications networks.
520
$a
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Machine Learning for Networking, MLN 2019, held in Paris, France, in December 2019. The 26 revised full papers included in the volume were carefully reviewed and selected from 75 submissions. They present and discuss new trends in deep and reinforcement learning, patternrecognition and classi cation for networks, machine learning for network slicingoptimization, 5G system, user behavior prediction, multimedia, IoT, securityand protection, optimization and new innovative machine learning methods, performanceanalysis of machine learning algorithms, experimental evaluations ofmachine learning, data mining in heterogeneous networks, distributed and decentralizedmachine learning algorithms, intelligent cloud-support communications,ressource allocation, energy-aware communications, software de ned networks,cooperative networks, positioning and navigation systems, wireless communications,wireless sensor networks, underwater sensor networks.
650
0
$a
Machine learning
$v
Congresses.
$3
384498
650
0
$a
Computer networks
$v
Congresses.
$3
384494
650
1 4
$a
Data Mining and Knowledge Discovery.
$3
275288
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
650
2 4
$a
Computer Applications.
$3
273760
650
2 4
$a
Security.
$3
760527
700
1
$a
Boumerdassi, Selma.
$3
731365
700
1
$a
Renault, Eric.
$3
535791
700
1
$a
Muhlethaler, Paul.
$3
841429
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Information systems and applications, incl. internet/web, and HCI.
$3
822022
856
4 0
$u
https://doi.org/10.1007/978-3-030-45778-5
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000178445
電子館藏
1圖書
電子書
EB Q325.5 .I51 2019 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-45778-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login