85 research outputs found
High Performance Attack Estimation in Large-Scale Network Flows
Network based attacks are the major threat to security on the Internet. The volume of traffic and the high variability of the attacks place threat detection squarely in the domain of big data. Conventional approaches are mostly based on signatures. While these are relatively inexpensive computationally, they are inflexible and insensitive to small variations in the attack vector. Therefore we explored the use of machine learning techniques on real flow data. We found that benign traffic could be identified with high accuracy
Application of Remote Sensing to the Chesapeake Bay Region. Volume 2: Proceedings
A conference was held on the application of remote sensing to the Chesapeake Bay region. Copies of the papers, resource contributions, panel discussions, and reports of the working groups are presented
Application of Remote Sensing to the Chesapeake Bay Region. Volume 1: Executive summary
The proceedings are presented of a conference, jointly sponsored by the National Aeronautics and Space Administration, the U.S. Environmental Protection Agency, and the University of Maryland. The purpose of the Conference was to assemble representatives of federal and state government agencies engaged in research on the condition and evolution of the Chesapeake Bay to compose a status report, to present current activities and future plans, and to recommend a long-range future course of policies and programs
Illicit Activity Detection in Large-Scale Dark and Opaque Web Social Networks
Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username challenging. Thus we explored classifying users from their language usage in their chat messages.The volume and velocity of Telegram chat data place it well within the domain of big data. Machine learning and natural language processing (NLP) tools are necessary to classify this chat data. We developed NLP tools for classifying users and the chat group to which their messages belong. We found that legitimate and illegitimate chat groups could be classified with high accuracy. We also were able to classify bots, humans, and advertisements within conversations
Analysis of drug resistance in HIV protease
Abstract Background Drug resistance in HIV is the major problem limiting effective antiviral therapy. Computational techniques for predicting drug resistance profiles from genomic data can accelerate the appropriate choice of therapy. These techniques can also be used to select protease mutants for experimental studies of resistance and thereby assist in the development of next-generation therapies. Results The machine learning produced highly accurate and robust classification of HIV protease resistance. Genotype data were mapped to the enzyme structure and encoded using Delaunay triangulation. Generative machine learning models trained on one inhibitor could classify resistance from other inhibitors with varying levels of accuracy. Generally, the accuracy was best when the inhibitors were chemically similar. Conclusions Restricted Boltzmann Machines are an effective machine learning tool for classification of genomic and structural data. They can also be used to compare resistance profiles of different protease inhibitors
- …