The purpose of this work consists in finding a method able to detect anomalies and adapt to new behaviours in an IP-network. Here is possible to find a work of investigation about the different anomaly detection systems. During the introduction and the first points, the audience could realize how the field of anomaly detection is divided in two big groups: Anomaly detection systems based in rules, and adaptive anomaly detection systems. These two ideas will be discuss, and some examples of each technology are given. In the case of adaptive anomaly detection, there are some techniques proposed. One of them is developed during the rest of the work. I wanted to implement this technique in a small network property of the RUS department...
In order to understand the molecular basis of living cells and organisms, biologists over the past d...
In this report, two applications of neural networks are investigated. The first one is low bit rate ...
This document analyses the current State-of-the-Art algorithms in the fields of Natural Language Pro...
In the first sub-section of the thesis, signal design for both linear and nonlinear system identific...
The fast-fluxing has been used by attackers to increase the availability of malicious domains and th...
Anomaly management—the detection, diagnosis, and resolution of anomalies in a system—is traditionall...
This thesis introduces a comprehensive approach for making a particular class of embedded processors...
Integration of artificial intelligence and unmanned aerial vehicles (UAVs) has been an active resear...
Data Mining (DM) refers to the analysis of observational datasets to find relationships and to summa...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
Due to Globalization outsourcing of SoC designs either for verification, testing and fabrication has...
Fault diagnosis on VLSI digital circuit is a technique to detect a fault and the location of the fau...
The explosion of high throughput genomic data in recent years has already altered our view of the ex...
It is now clear that machine learning will be widely used in future telecommunication networks as it...
Network coding (NC) is a relatively recent novel technique that generalises network operation beyon...
In order to understand the molecular basis of living cells and organisms, biologists over the past d...
In this report, two applications of neural networks are investigated. The first one is low bit rate ...
This document analyses the current State-of-the-Art algorithms in the fields of Natural Language Pro...
In the first sub-section of the thesis, signal design for both linear and nonlinear system identific...
The fast-fluxing has been used by attackers to increase the availability of malicious domains and th...
Anomaly management—the detection, diagnosis, and resolution of anomalies in a system—is traditionall...
This thesis introduces a comprehensive approach for making a particular class of embedded processors...
Integration of artificial intelligence and unmanned aerial vehicles (UAVs) has been an active resear...
Data Mining (DM) refers to the analysis of observational datasets to find relationships and to summa...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
Due to Globalization outsourcing of SoC designs either for verification, testing and fabrication has...
Fault diagnosis on VLSI digital circuit is a technique to detect a fault and the location of the fau...
The explosion of high throughput genomic data in recent years has already altered our view of the ex...
It is now clear that machine learning will be widely used in future telecommunication networks as it...
Network coding (NC) is a relatively recent novel technique that generalises network operation beyon...
In order to understand the molecular basis of living cells and organisms, biologists over the past d...
In this report, two applications of neural networks are investigated. The first one is low bit rate ...
This document analyses the current State-of-the-Art algorithms in the fields of Natural Language Pro...