Detecting Hidden Units and Network Size from Perceptible Dynamics
نویسندگان
چکیده
منابع مشابه
Network inference with hidden units.
We derive learning rules for finding the connections between units in stochastic dynamical networks from the recorded history of a "visible'' subset of the units. We consider two models. In both of them, the visible units are binary and stochastic. In one model the "hidden'' units are continuous-valued, with sigmoidal activation functions, and in the other they are binary and stochastic like th...
متن کاملApplications of Hidden Markov Models to Detecting Multi - stage Network
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended period of time. Within each step, specific actions may be interchangeable. A perpetrator may deliberately use a choice of actions within a step to mask the intrusion. In other cases, alternate action sequences may be ra...
متن کاملDetecting Botnets Using Hidden Markov Models on Network Traces
One of the most prevalent problems in modern internet security is the botnet – large numbers of computers running the same malicious, self-propagating program without their users' knowledge. Bot programs communicate with their (human) botmaster, who can command them to stage distributed denial of service attacks, send spam, commit click fraud, send back user passwords, or any number of other il...
متن کاملHidden hysteresis – population dynamics can obscure gene network dynamics
BACKGROUND Positive feedback is a common motif in gene regulatory networks. It can be used in synthetic networks as an amplifier to increase the level of gene expression, as well as a nonlinear module to create bistable gene networks that display hysteresis in response to a given stimulus. Using a synthetic positive feedback-based tetracycline sensor in E. coli, we show that the population dyna...
متن کاملDetecting Hidden Leakages
Reducing the entropy of the mask is a technique which has been proposed to mitigate the high performance overhead of masked software implementations of symmetric block ciphers. Rotating S-box Masking (RSM) is an example of such schemes applied to AES with the purpose of maintaining the security at least against univariate first-order side-channel attacks. This article examines the vulnerability...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review Letters
سال: 2019
ISSN: 0031-9007,1079-7114
DOI: 10.1103/physrevlett.122.158301