Seminar on Internet Technologies (Summer 2015): Difference between revisions

Line 83: Line 83:
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| [https://www.cs.duke.edu/~tbenson/papers/IMC11.pdf][https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/kim]
| [https://www.cs.duke.edu/~tbenson/papers/IMC11.pdf][https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/kim]
|-
| '''Applying Machine Learning to Computer Networks: Intrusion Detection Systems''' ''( Assigned to Omar Shaya)''
Machine Learning is one of the big topics in computer science today. However, it has rarely been applied to computer networking.
In this topic, we will investigate one of the few applications thought of so far to answer one question:
Can and should we apply machine learning to detect attacks in networks?
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6524462]
|-
|-
| '''Controllers in Software-defined Networks - A Survey'''   
| '''Controllers in Software-defined Networks - A Survey'''