Abstract is missing.
- Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture ModelYang Chen, Junzhe Zhang, Chai Kiat Yeo. 1-14 [doi]
- Towards a Hierarchical Deep Learning Approach for Intrusion DetectionFrançois Alin, Amine Chemchem, Florent Nolot, Olivier Flauzac, Michaël Krajecki. 15-27 [doi]
- Network Traffic Classification Using Machine Learning for Software Defined NetworksMenuka Perera Jayasuriya Kuranage, Kandaraj Piamrat, Salima Hamma. 28-39 [doi]
- A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion DetectionAnurag Das, Samuel A. Ajila, Chung-Horng Lung. 40-57 [doi]
- Q-routing: From the Algorithm to the Routing ProtocolAlexis Bitaillou, Benoît Parrein, Guillaume Andrieux. 58-69 [doi]
- Language Model Co-occurrence Linking for Interleaved Activity DiscoveryEoin Rogers, John D. Kelleher, Robert J. Ross. 70-84 [doi]
- Achieving Proportional Fairness in WiFi Networks via Bandit Convex OptimizationGolshan Famitafreshi, Cristina Cano. 85-98 [doi]
- Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and RecoveryOla Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. 99-116 [doi]
- Root Cause Analysis of Reduced Accessibility in 4G NetworksDiogo Ferreira, Carlos R. Senna, Paulo Salvador, Luís Cortesão, Cristina Pires, Rui Pedro, Susana Sargento. 117-133 [doi]
- Space-Time Pattern Extraction in Alarm Logs for Network DiagnosisAchille Salaün, Anne Bouillard, Marc-Olivier Buob. 134-153 [doi]
- Machine Learning Methods for Connection RTT and Loss Rate Estimation Using MPI Measurements Under Random LossesNageswara S. V. Rao, Neena Imam, Zhengchun Liu, Rajkumar Kettimuthu, Ian T. Foster. 154-174 [doi]
- Algorithm Selection and Model Evaluation in Application Design Using Machine LearningSrikanth Bethu, B. Sankara Babu, K. Madhavi, P. Gopala Krishna. 175-195 [doi]
- GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNNTaku Wakui, Takao Kondo, Fumio Teraoka. 196-211 [doi]
- Revealing User Behavior by Analyzing DNS TrafficMartín Panza, Diego Madariaga, Javier Bustos-Jiménez. 212-226 [doi]
- A New Approach to Determine the Optimal Number of Clusters Based on the Gap StatisticJaekyung Yang, Jong Yeong Lee, Myoungjin Choi, Yeongin Joo. 227-239 [doi]
- MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 DatasetArnaud Rosay, Florent Carlier, Pascal Leroux. 240-254 [doi]
- Random Forests with a Steepend Gini-Index Split Function and Feature Coherence InjectionMandlenkosi Victor Gwetu, Jules-Raymond Tapamo, Serestina Viriri. 255-272 [doi]
- Emotion-Based Adaptive Learning SystemsSai Prithvisingh Taurah, Jeshta Bhoyedhur, Roopesh Kevin Sungkur. 273-286 [doi]
- Machine Learning Methods for Anomaly Detection in IoT Networks, with IllustrationsVassia Bonandrini, Jean-François Bercher, Nawel Zangar. 287-295 [doi]
- DeepRoute: Herding Elephant and Mice Flows with Reinforcement LearningMariam Kiran, Bashir Mohammed, Nandini Krishnaswamy. 296-314 [doi]
- Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some AlternativeOnyekachi Nwamuo, Paulo Magella de Faria Quinan, Issa Traoré, Isaac Woungang, Abdulaziz Aldribi. 315-332 [doi]
- Estimation of the Hidden Message Length in Steganography: A Deep Learning ApproachFrançois Kasséné Gomis, Thierry Bouwmans, Mamadou Samba Camara, Idy Diop. 333-341 [doi]
- An Adaptive Deep Learning Algorithm Based Autoencoder for Interference ChannelsDehao Wu, Maziar Nekovee, Yue Wang. 342-354 [doi]
- A Learning Approach for Road Traffic Optimization in Urban EnvironmentsAhmed Mejdoubi, Ouadoudi Zytoune, Hacène Fouchal, Mohamed Ouadou. 355-366 [doi]
- CSI Based Indoor Localization Using Ensemble Neural NetworksAbdallah Sobehy, Éric Renault, Paul Mühlethaler. 367-378 [doi]
- Bayesian Classifiers in Intrusion Detection SystemsMardini-Bovea Johan, De-La-Hoz-Franco Emiro, Molina-Estren Diego, Paola Ariza Colpas, Andrés Ortiz, Julio Ortega, César A. Cárdenas R., Carlos Collazos-Morales. 379-391 [doi]
- A Novel Approach Towards Analysis of Attacker Behavior in DDoS AttacksHimanshu Gupta, Tanmay Girish Kulkarni, Lov Kumar, Lalita Bhanu Murthy Neti. 392-402 [doi]
- Jason-RS, A Collaboration Between Agents and an IoT PlatformHantanirina Felixie Rafalimanana, Jean Luc Razafindramintsa, Sylvain Cherrier, Thomas Mahatody, Laurent George 0001, Victor Manantsoa. 403-413 [doi]
- Scream to Survive(S2S): Intelligent System to Life-Saving in Disasters ReliefNardjes Bouchemal, Aissa Serrar, Yehya Bouzeraa, Naila Bouchemal. 414-430 [doi]
- Association Rules Algorithms for Data Mining Process Based on Multi Agent SystemImane Belabed, Mohammed Talibi Alaoui, Jaara El Miloud, Abdelmajid Belabed. 431-443 [doi]
- Internet of Things: Security Between Challenges and AttacksBenali Cherif, Zaïdi Sahnoun, Maamri Ramdane, Nardjes Bouchemal. 444-460 [doi]
- Socially and Biologically Inspired Computing for Self-organizing Communications NetworksJuan P. Ospina, Joaquín F. Sánchez, Jorge E. Ortiz, Carlos Collazos-Morales, Paola Ariza Colpas. 461-484 [doi]