Computer network

Results: 31604



#Item
312010 IEEE Symposium on Security and Privacy  Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and

2010 IEEE Symposium on Security and Privacy Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and

Add to Reading List

Source URL: oaklandsok.github.io

Language: English - Date: 2018-03-14 15:33:55
    32Effective Training of a Neural Network Character Classifier for Word Recognition Larry Yaeger Apple Computer 5540 Bittersweet Rd. Morgantown, IN 46160

    Effective Training of a Neural Network Character Classifier for Word Recognition Larry Yaeger Apple Computer 5540 Bittersweet Rd. Morgantown, IN 46160

    Add to Reading List

    Source URL: www.dicklyon.com

    Language: English - Date: 2006-06-30 14:43:30
      33Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

      Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

      Add to Reading List

      Source URL: gray-world.net

      Language: English - Date: 2010-06-12 03:14:41
        34Learning Deep Neural Network Policies with Continuous Memory States Marvin Zhang, Zoe McCarthy, Chelsea Finn, Sergey Levine, Pieter Abbeel Department of Electrical Engineering and Computer Science, UC Berkeley {zhangmarv

        Learning Deep Neural Network Policies with Continuous Memory States Marvin Zhang, Zoe McCarthy, Chelsea Finn, Sergey Levine, Pieter Abbeel Department of Electrical Engineering and Computer Science, UC Berkeley {zhangmarv

        Add to Reading List

        Source URL: www.thespermwhale.com

        Language: English - Date: 2015-11-25 22:12:00
          35CS461/ECE422 Computer Security I March 9, 2015 Project 3: Network Security

          CS461/ECE422 Computer Security I March 9, 2015 Project 3: Network Security

          Add to Reading List

          Source URL: courses.engr.illinois.edu

          Language: English - Date: 2015-04-20 13:04:03
            36A view of the dual-stack world from .jp Kenjiro Cho WIDE Project/Sony Computer Science Labs, Inc. motivation it’s time to consider the quality of IPv6 network

            A view of the dual-stack world from .jp Kenjiro Cho WIDE Project/Sony Computer Science Labs, Inc. motivation it’s time to consider the quality of IPv6 network

            Add to Reading List

            Source URL: www.iepg.org

            Language: English - Date: 2006-11-15 14:28:06
              37The Complexity Landscape of Fixed-Parameter Directed Steiner Network Problems Dániel Marx Institute for Computer Science and Control, Hungarian Academy of Sciences (MTA SZTAKI) Budapest, Hungary

              The Complexity Landscape of Fixed-Parameter Directed Steiner Network Problems Dániel Marx Institute for Computer Science and Control, Hungarian Academy of Sciences (MTA SZTAKI) Budapest, Hungary

              Add to Reading List

              Source URL: www.cs.bme.hu

              Language: English - Date: 2016-09-26 07:51:42
                38A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Johanna Amann1, Robin Sommer1,2, Aashish Sharma2, and Seth Hall1 1 International Computer Science Institute 2

                A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Johanna Amann1, Robin Sommer1,2, Aashish Sharma2, and Seth Hall1 1 International Computer Science Institute 2

                Add to Reading List

                Source URL: www.icir.org

                Language: English - Date: 2017-10-16 19:29:53
                  39DEMS: A Data Mining Based Technique to Handle Missing Data in Mobile Sensor Network Applications Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Hanqing Yang School of Computer Science University of Oklahoma Norman, Oklah

                  DEMS: A Data Mining Based Technique to Handle Missing Data in Mobile Sensor Network Applications Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Hanqing Yang School of Computer Science University of Oklahoma Norman, Oklah

                  Add to Reading List

                  Source URL: www.cs.ucy.ac.cy

                  Language: English - Date: 2010-09-29 03:22:34
                    40中国科学院  计算机网络信息中心 Computer Network Information Center, Chinese Academy of Sciences

                    中国科学院 计算机网络信息中心 Computer Network Information Center, Chinese Academy of Sciences

                    Add to Reading List

                    Source URL: www.whigg.ac.cn

                    Language: Chinese - Date: 2014-12-14 21:01:59