Network Computer

Results: 31604



#Item
31

2010 IEEE Symposium on Security and Privacy Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and

Add to Reading List

Source URL: oaklandsok.github.io

Language: English - Date: 2018-03-14 15:33:55
    32

    Effective Training of a Neural Network Character Classifier for Word Recognition Larry Yaeger Apple Computer 5540 Bittersweet Rd. Morgantown, IN 46160

    Add to Reading List

    Source URL: www.dicklyon.com

    Language: English - Date: 2006-06-30 14:43:30
      33

      Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

      Add to Reading List

      Source URL: gray-world.net

      Language: English - Date: 2010-06-12 03:14:41
        34

        Learning Deep Neural Network Policies with Continuous Memory States Marvin Zhang, Zoe McCarthy, Chelsea Finn, Sergey Levine, Pieter Abbeel Department of Electrical Engineering and Computer Science, UC Berkeley {zhangmarv

        Add to Reading List

        Source URL: www.thespermwhale.com

        Language: English - Date: 2015-11-25 22:12:00
          35

          CS461/ECE422 Computer Security I March 9, 2015 Project 3: Network Security

          Add to Reading List

          Source URL: courses.engr.illinois.edu

          Language: English - Date: 2015-04-20 13:04:03
            36

            A view of the dual-stack world from .jp Kenjiro Cho WIDE Project/Sony Computer Science Labs, Inc. motivation it’s time to consider the quality of IPv6 network

            Add to Reading List

            Source URL: www.iepg.org

            Language: English - Date: 2006-11-15 14:28:06
              37

              The Complexity Landscape of Fixed-Parameter Directed Steiner Network Problems Dániel Marx Institute for Computer Science and Control, Hungarian Academy of Sciences (MTA SZTAKI) Budapest, Hungary

              Add to Reading List

              Source URL: www.cs.bme.hu

              Language: English - Date: 2016-09-26 07:51:42
                38

                A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Johanna Amann1, Robin Sommer1,2, Aashish Sharma2, and Seth Hall1 1 International Computer Science Institute 2

                Add to Reading List

                Source URL: www.icir.org

                Language: English - Date: 2017-10-16 19:29:53
                  39

                  DEMS: A Data Mining Based Technique to Handle Missing Data in Mobile Sensor Network Applications Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Hanqing Yang School of Computer Science University of Oklahoma Norman, Oklah

                  Add to Reading List

                  Source URL: www.cs.ucy.ac.cy

                  Language: English - Date: 2010-09-29 03:22:34
                    40

                    中国科学院 计算机网络信息中心 Computer Network Information Center, Chinese Academy of Sciences

                    Add to Reading List

                    Source URL: www.whigg.ac.cn

                    Language: Chinese - Date: 2014-12-14 21:01:59
                      UPDATE