85 research outputs found

    High Performance Attack Estimation in Large-Scale Network Flows

    Get PDF
    Network based attacks are the major threat to security on the Internet. The volume of traffic and the high variability of the attacks place threat detection squarely in the domain of big data. Conventional approaches are mostly based on signatures. While these are relatively inexpensive computationally, they are inflexible and insensitive to small variations in the attack vector. Therefore we explored the use of machine learning techniques on real flow data. We found that benign traffic could be identified with high accuracy

    Application of Remote Sensing to the Chesapeake Bay Region. Volume 2: Proceedings

    Get PDF
    A conference was held on the application of remote sensing to the Chesapeake Bay region. Copies of the papers, resource contributions, panel discussions, and reports of the working groups are presented

    Application of Remote Sensing to the Chesapeake Bay Region. Volume 1: Executive summary

    Get PDF
    The proceedings are presented of a conference, jointly sponsored by the National Aeronautics and Space Administration, the U.S. Environmental Protection Agency, and the University of Maryland. The purpose of the Conference was to assemble representatives of federal and state government agencies engaged in research on the condition and evolution of the Chesapeake Bay to compose a status report, to present current activities and future plans, and to recommend a long-range future course of policies and programs

    Illicit Activity Detection in Large-Scale Dark and Opaque Web Social Networks

    Get PDF
    Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username challenging. Thus we explored classifying users from their language usage in their chat messages.The volume and velocity of Telegram chat data place it well within the domain of big data. Machine learning and natural language processing (NLP) tools are necessary to classify this chat data. We developed NLP tools for classifying users and the chat group to which their messages belong. We found that legitimate and illegitimate chat groups could be classified with high accuracy. We also were able to classify bots, humans, and advertisements within conversations

    Neurovascular function in the rat during pregnancy

    No full text

    Analysis of drug resistance in HIV protease

    No full text
    Abstract Background Drug resistance in HIV is the major problem limiting effective antiviral therapy. Computational techniques for predicting drug resistance profiles from genomic data can accelerate the appropriate choice of therapy. These techniques can also be used to select protease mutants for experimental studies of resistance and thereby assist in the development of next-generation therapies. Results The machine learning produced highly accurate and robust classification of HIV protease resistance. Genotype data were mapped to the enzyme structure and encoded using Delaunay triangulation. Generative machine learning models trained on one inhibitor could classify resistance from other inhibitors with varying levels of accuracy. Generally, the accuracy was best when the inhibitors were chemically similar. Conclusions Restricted Boltzmann Machines are an effective machine learning tool for classification of genomic and structural data. They can also be used to compare resistance profiles of different protease inhibitors

    The Value of Nothing

    No full text
    • …
    corecore