31![2010 IEEE Symposium on Security and Privacy Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and 2010 IEEE Symposium on Security and Privacy Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and](https://www.pdfsearch.io/img/741caceaa2a68e01e8a7fd4fa6ff09c8.jpg) | Add to Reading ListSource URL: oaklandsok.github.ioLanguage: English - Date: 2018-03-14 15:33:55
|
---|
32![Effective Training of a Neural Network Character Classifier for Word Recognition Larry Yaeger Apple Computer 5540 Bittersweet Rd. Morgantown, IN 46160 Effective Training of a Neural Network Character Classifier for Word Recognition Larry Yaeger Apple Computer 5540 Bittersweet Rd. Morgantown, IN 46160](https://www.pdfsearch.io/img/82a579f125db917f1549826dc8e97780.jpg) | Add to Reading ListSource URL: www.dicklyon.comLanguage: English - Date: 2006-06-30 14:43:30
|
---|
33![Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George](https://www.pdfsearch.io/img/ad82dca1825e246d0fe43a7cecea7353.jpg) | Add to Reading ListSource URL: gray-world.netLanguage: English - Date: 2010-06-12 03:14:41
|
---|
34![Learning Deep Neural Network Policies with Continuous Memory States Marvin Zhang, Zoe McCarthy, Chelsea Finn, Sergey Levine, Pieter Abbeel Department of Electrical Engineering and Computer Science, UC Berkeley {zhangmarv Learning Deep Neural Network Policies with Continuous Memory States Marvin Zhang, Zoe McCarthy, Chelsea Finn, Sergey Levine, Pieter Abbeel Department of Electrical Engineering and Computer Science, UC Berkeley {zhangmarv](https://www.pdfsearch.io/img/eab0ff58393124d4df542980c6ad36c9.jpg) | Add to Reading ListSource URL: www.thespermwhale.comLanguage: English - Date: 2015-11-25 22:12:00
|
---|
35![CS461/ECE422 Computer Security I March 9, 2015 Project 3: Network Security CS461/ECE422 Computer Security I March 9, 2015 Project 3: Network Security](https://www.pdfsearch.io/img/9fe19b4c6d6f4e848d13d4e5a0722506.jpg) | Add to Reading ListSource URL: courses.engr.illinois.eduLanguage: English - Date: 2015-04-20 13:04:03
|
---|
36![A view of the dual-stack world from .jp Kenjiro Cho WIDE Project/Sony Computer Science Labs, Inc.
motivation it’s time to consider the quality of IPv6 network A view of the dual-stack world from .jp Kenjiro Cho WIDE Project/Sony Computer Science Labs, Inc.
motivation it’s time to consider the quality of IPv6 network](https://www.pdfsearch.io/img/4181f6dde619eb71ab868fd84b766295.jpg) | Add to Reading ListSource URL: www.iepg.orgLanguage: English - Date: 2006-11-15 14:28:06
|
---|
37![The Complexity Landscape of Fixed-Parameter Directed Steiner Network Problems Dániel Marx Institute for Computer Science and Control, Hungarian Academy of Sciences (MTA SZTAKI) Budapest, Hungary The Complexity Landscape of Fixed-Parameter Directed Steiner Network Problems Dániel Marx Institute for Computer Science and Control, Hungarian Academy of Sciences (MTA SZTAKI) Budapest, Hungary](https://www.pdfsearch.io/img/dae404c849f44f361193b5740d98ae29.jpg) | Add to Reading ListSource URL: www.cs.bme.huLanguage: English - Date: 2016-09-26 07:51:42
|
---|
38![A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Johanna Amann1, Robin Sommer1,2, Aashish Sharma2, and Seth Hall1 1 International Computer Science Institute 2 A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Johanna Amann1, Robin Sommer1,2, Aashish Sharma2, and Seth Hall1 1 International Computer Science Institute 2](https://www.pdfsearch.io/img/b18216b5e6392a25d9d5f573a4a2f6ec.jpg) | Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2017-10-16 19:29:53
|
---|
39![DEMS: A Data Mining Based Technique to Handle Missing Data in Mobile Sensor Network Applications Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Hanqing Yang School of Computer Science University of Oklahoma Norman, Oklah DEMS: A Data Mining Based Technique to Handle Missing Data in Mobile Sensor Network Applications Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Hanqing Yang School of Computer Science University of Oklahoma Norman, Oklah](https://www.pdfsearch.io/img/5eaf578a0ca49d566ddcec0f6ed96c90.jpg) | Add to Reading ListSource URL: www.cs.ucy.ac.cyLanguage: English - Date: 2010-09-29 03:22:34
|
---|
40![中国科学院 计算机网络信息中心 Computer Network Information Center, Chinese Academy of Sciences 中国科学院 计算机网络信息中心 Computer Network Information Center, Chinese Academy of Sciences](https://www.pdfsearch.io/img/57d51187984d3f94d75d6c80028bed56.jpg) | Add to Reading ListSource URL: www.whigg.ac.cnLanguage: Chinese - Date: 2014-12-14 21:01:59
|
---|