Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Roger Robson dos Santos"'
Publikováno v:
Artificial Intelligence Review. 55:3243-3282
The classification task usually works with flat and batch learners, assuming problems as stationary and without relations between class labels. Nevertheless, several real-world problems do not assume these premises, i.e., data have labels organized h
Autor:
Jhonatan Geremias, Jackson Mallmann, Altair Olivo Santin, Eduardo Viegas, Roger Robson dos Santos
Publikováno v:
Future Generation Computer Systems. 112:945-955
Convolutional neural network (CNN) models are typically composed of several gigabytes of data, requiring dedicated hardware and significant processing capabilities for proper handling. In addition, video-detection tasks are typically performed offlin
Publikováno v:
Anais do XXI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2021).
As técnicas de aprendizado de máquina para detecção de intrusão baseada na rede geralmente pressupõem que o tráfego da rede não muda com o tempo ou que as atualizações do modelo podem ser realizadas facilmente. Neste artigo, propomos um nov
Publikováno v:
Engenharias elétrica e de computação: O terceiro pilar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5cc04b347d8c03f4108701709884eb68
https://doi.org/10.22533/at.ed.4302130094
https://doi.org/10.22533/at.ed.4302130094
Autor:
Altair Olivo Santin, Felipe Ramos, Roger Robson dos Santos, Pedro Horchulhack, Allan Espindola, Eduardo Viegas
Publikováno v:
ICC
Resource allocation overbooking is an approach used by cloud providers that allocates more virtual resources than available on physical hardware, which may imply service quality degradation. Docker in cloud computing environments is being increasingl
Publikováno v:
ICC
Changes in network traffic behavior over time are neglected by authors who use machine learning techniques applied to intrusion detection. In general, it is assumed that periodic model updates are performed, regardless of the challenges related to su
Publikováno v:
IECON
Supervisory Control and Data Acquisition (SCADA) systems have been a frequent target of cyberattacks in Industrial Control Systems (ICS). As such systems are a frequent target of highly motivated attackers, researchers often resort to intrusion detec
Publikováno v:
Engenharia Elétrica e de Computação: Atividades Relacionadas com o Setor Científico e Tecnológico
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b294a87e0da1071912d7a942e2b1ad11
https://doi.org/10.22533/at.ed.67120020710
https://doi.org/10.22533/at.ed.67120020710
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030440404
AINA
AINA
Several works have proposed highly accurate network-based intrusion detection schemes through machine learning techniques. However, they are unable to address changes in network traffic behavior over time. Authors often assume periodic model updates,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a4a1428d0ecb6f2dbdd500609acba16f
https://doi.org/10.1007/978-3-030-44041-1_121
https://doi.org/10.1007/978-3-030-44041-1_121