Editor, Bureaucrats, Administrators
990
edits
(→Topics) |
(→Topics) |
||
Line 83: | Line 83: | ||
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | | [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | ||
| [https://www.cs.duke.edu/~tbenson/papers/IMC11.pdf][https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/kim] | | [https://www.cs.duke.edu/~tbenson/papers/IMC11.pdf][https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/kim] | ||
|- | |||
| '''Applying Machine Learning to Computer Networks: Intrusion Detection Systems''' ''( Assigned to Omar Shaya)'' | |||
Machine Learning is one of the big topics in computer science today. However, it has rarely been applied to computer networking. | |||
In this topic, we will investigate one of the few applications thought of so far to answer one question: | |||
Can and should we apply machine learning to detect attacks in networks? | |||
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | |||
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6524462] | |||
|- | |- | ||
| '''Controllers in Software-defined Networks - A Survey''' | | '''Controllers in Software-defined Networks - A Survey''' |