Using ML Models to Detect Malicious Traffic: Testing ML Models

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fully Complete Models for ML Polymorphic Types

We present an axiomatic characterization of models fully-complete for ML-polymorphic types of system F. This axiomatization is given for hyperdoctrine models, which arise as adjoint models, i.e. co-Kleisli categories of suitable linear categories. Examples of adjoint models can be obtained from categories of Partial Equivalence Relations over Linear Combinatory Algebras. We show that a special ...

متن کامل

Predicting NHL Match Outcomes with ML Models

Finding ways of predicting the outcome of sports games from performance data has always been an attractive proposition for many statisticians and, lately, of data miners using machine learning (ML) techniques. A research paper [1] on ice hockey (NHL) by a University of Ottawa team (from now on referred simply as Ottawa), and their generous sharing of the data used for their research provided th...

متن کامل

Efficient importance sampling for ML estimation of SCD models

The evaluation of the likelihood function of the stochastic conditional duration model requires to compute an integral that has the dimension of the sample size. We apply the efficient importance sampling method for computing this integral. We compare EIS-based ML estimation with QML estimation based on the Kalman filter. We find that EIS-ML estimation is more precise statistically, at a cost o...

متن کامل

Axiomatizing Fully Complete Models for ML Polymorphic Types

We present axioms on models of system F, which are suu-cient to show full completeness for ML-polymorphic types. These axioms are given for hyperdoctrine models, which arise as adjoint models, i.e. co-Kleisli categories of linear categories. Our axiomatization consists of two crucial steps. First, we axiomatize the fact that every relevant morphism in the model generates, under decomposition, a...

متن کامل

Elements of ML programming - ML 97 edition

elements of ml programming ml97 edition khbd elements of ml programming ml97 edition eyeguy elements of ml programming ml97 edition campen elements of ml programming ml97 edition anymix elements of ml programming ml97 edition dcnx elements of ml programming ml97 edition wigtql.herokuapp elements of ml programming ml97 edition ztrd elements of ml programming ml97 edition deelyey elements of ml p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Information Security Research

سال: 2020

ISSN: 2042-4639

DOI: 10.20533/ijisr.2042.4639.2020.0104