IoT Area Network Simulator For Network Dataset Generation
暂无分享,去创建一个
Yuto Lim | Yasuo Tan | Yoshiki Makino | Khoa Pho | Van Cu Pham | Van Cu Pham | Yasuo Tan | Khoa Pho | Yoshiki Makino | Yuto Lim
[1] Jan Vykopal,et al. Improving Host Profiling with Bidirectional Flows , 2009, 2009 International Conference on Computational Science and Engineering.
[2] Ali A. Ghorbani,et al. Characterization of Tor Traffic using Time based Features , 2017, ICISSP.
[3] Brian Trammell,et al. Bidirectional Flow Export Using IP Flow Information Export (IPFIX) , 2008, RFC.
[4] Zhitang Chen,et al. Predicting future traffic using Hidden Markov Models , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).
[5] C.-C. Jay Kuo,et al. Internet Traffic Classification for Scalable QOS Provision , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[6] Zhitang Chen,et al. Online flow size prediction for improved network routing , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).
[7] Steven Euijong Whang,et al. A Survey on Data Collection for Machine Learning: A Big Data - AI Integration Perspective , 2018, IEEE Transactions on Knowledge and Data Engineering.
[8] Flaviu Cristian,et al. Understanding fault-tolerant distributed systems , 1991, CACM.
[9] Nadeem Javaid,et al. Fault Detection in Wireless Sensor Networks through the Random Forest Classifier , 2019, Sensors.
[10] C. M. Sperberg-McQueen,et al. Extensible markup language , 1997 .
[11] Riaz Ahmed Shaikh,et al. An analysis of fault detection strategies in wireless sensor networks , 2017, J. Netw. Comput. Appl..
[12] Hong Liu,et al. Inter-data-center network traffic prediction with elephant flows , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[13] Sudarshan Rao. Operational Fault Detection in cellular wireless base-stations , 2006, IEEE Transactions on Network and Service Management.
[14] Benoit Claise,et al. Cisco Systems NetFlow Services Export Version 9 , 2004, RFC.
[15] Krzysztof Grochla,et al. Testing and Scalability Analysis of Network Management Systems Using Device Emulation , 2012, CN.
[16] Marti A. Hearst. Trends & Controversies: Support Vector Machines , 1998, IEEE Intell. Syst..
[17] Yuto Lim,et al. Time Delay Modeling for Energy Efficient Thermal Comfort Control System in Smart Home Environment , 2017 .
[18] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[19] Senén Barro,et al. Do we need hundreds of classifiers to solve real world classification problems? , 2014, J. Mach. Learn. Res..
[20] Ali A. Ghorbani,et al. Characterization of Encrypted and VPN Traffic using Time-related Features , 2016, ICISSP.
[21] Yuto Lim,et al. Support for ECHONET-based smart home environments in the universAAL ecosystem , 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE).
[22] Mo Adda,et al. Comparative Analysis of Clustering Techniques in Network Traffic Faults Classification , 2017 .
[23] Min Zhang,et al. Failure prediction using machine learning and time series in optical network. , 2017, Optics express.
[24] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[25] Aman Jantan,et al. State-of-the-art in artificial neural network applications: A survey , 2018, Heliyon.
[26] Eric Eaton,et al. Building more accurate decision trees with the additive tree , 2019, Proceedings of the National Academy of Sciences.
[27] Raouf Boutaba,et al. A comprehensive survey on machine learning for networking: evolution, applications and research opportunities , 2018, Journal of Internet Services and Applications.
[28] Arash Habibi Lashkari,et al. Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls , 2019, 2019 International Carnahan Conference on Security Technology (ICCST).
[29] Chris D. Nugent,et al. The creation of simulated activity datasets using a graphical intelligent environment simulation tool , 2014, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[30] Kevin L. Priddy,et al. Artificial neural networks - an introduction , 2005, Tutorial text series.
[31] Arnaud Dupas,et al. Semantic networking: Flow-based, traffic-aware, and self-managed networking , 2009 .
[32] Ali A. Ghorbani,et al. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy , 2019, 2019 International Carnahan Conference on Security Technology (ICCST).
[33] Yuto Lim,et al. An Ontology-driven ECHONET Lite Adaptation Layer for Smart Homes , 2019, J. Inf. Process..
[34] Antonio Pescapè,et al. Traffic identification engine: an open platform for traffic classification , 2014, IEEE Network.
[35] Andrej Udovč,et al. Extending life cycle assessment normalization factors and use of machine learning – A Slovenian case study , 2015 .
[36] Keiichi Yasumoto,et al. UbiREAL: Realistic Smartspace Simulator for Systematic Testing , 2006, UbiComp.
[37] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.