Functional networks: from brain dynamics to information systems security. David Papo
|
|
- Kristian Skinner
- 6 years ago
- Views:
Transcription
1 Functional networks: from brain dynamics to information systems security David Papo URJC, Móstoles, 31 October 2014
2 Goal To illustrate the motivation for a functional network representation in information systems security. 2
3 Outline 1) Networks in neuroscience: potential and methods 2) Mini introduction to networks 3) Network theory and Information systems security issues: some suggestions 3
4 Networks in the brain 4
5 Some facts about the brain Circuitry: ~ neurons (~ 10 4 synapses/neuron) ~ km of cables 10 5 neurons, 10 8 synapses, 4 km of axons (diameter: ~ 0.3 µm) per mm 3 Theoretical band-pass ~ 1 terabit/s (~ total internet capacity 2002) Storage capacity: bytes Computation rate: 3.6 X synaptic operations Computational efficiency: synaptic operations/joule Energy consumption: ~ 2% total body weight ~ 15% cardiac output ~ 20% total oxygen consumption ~ 25% total glucose consumption ~ 50% energy is used to send signals (axons &synapses) How does the brain cope with the energetic problem? 5
6 Appropriate design Component miniaturisation Elimination of superfluous signals Sparse information codes Distribution in space and time Multiscale-ness 6
7 The brain in action Brain activity consists of transient spatio-temporal patterns of correlated activity Even at rest, this activity is non random Contains structure both in space and in time: neuronal assemblies form at all spatial scales and with non-trivial temporal patterns Observed function results from the renormalization of activity at all these scales Patterns seen during task-induced activation are already present in spontaneous activity Understanding the effect of perturbations without perturbing the system 7
8 Statistical Mechanics approach ~ neurons (~ 10 4 synapses) ~ km of cables 1 mm 3 of rat cortex contains: 10 5 neurons 10 8 synapses 4 km of axons Theoretical band-pass ~ 1 terabit/s (~ total internet capacity 2002) Anatomical network Physical cables Dynamical network Information packets Complex networks representation Statistical mechanics approach Observable macroscopic properties emerge as a result of the interactions of a huge number of microscopic particles (The characteristics of each particle are not important) 8
9 Describing systems as complex networks Network set of nodes connected by links Graph theory set of mathematical tools allowing a quantitative characterization of a system at many spatial and temporal scales From: R.V. Solé and S. Valverde Lecture Notes in Physics, 60, 189, 2004 Read more at: Boccaletti et al., Phys. Rep., (2006) 9
10 A fleeting foray into complex network theory 10
11 What s a network? Network: Set of labeled nodes and links uniting them Adjacency matrix: The matrix of entries a(i,j)=1 if there is a link between node i and j a(i,j)=0 otherwise
12 Degree distribution Degree if node i: Number of links of node i k i j a ij Network: 1 Degree distribution: P(k): how many nodes have degree k P(k)
13 Clustering coefficient Local clustering coefficient C i # of closed triangles k i (k i 1)/2 Network 1 Clustering coefficient of nodes 2,3 2 3 C C
14 Shortest distance The shortest distance between two nodes is the minimal number of links than a path must hop to go from the source to the destination The shortest distance between node 4 and node 1 is 3 between node 3 and node 1 is
15 Communities Dolphins social network High-school dating networks A community is a set of nodes with a similar connectivity pattern. S. Fortunato Phys. Rep
16 Protein-protein networks Social networks
17 Extraction of sector information in financial markets Minimal-Spanning-Trees Planar maximally filtered graphs NYSE daily returns USA equity market Bonanno et al. (2003) Tumminello et al. (2007) 17
18 Community structure Communities More links inside than outside 18
19 Community structure There is no absolute definition of community, only a relative one. A network has a community structure if it is more ordered than a random version of it (null model). Null model: class of random networks with the same degree sequence of the original one. There are many algorithms for community detection. 19
20 A new paradigm for brain function A new paradigm for brain function From few degrees of freedom to statistical mechanics Micro, meso and macroscopic scales (N.B. scales are relative) Emergence of function Network topological properties at all scales rather than specific node s ones From important parts to general organizing principles Nodes and node centrality Global properties: SW, scale-free; assortativity (but at what scales?); core-periphery Mesoscale properties: motifs, community structure Relationships across scales: hierarchical structure; self-similarity, self-dissimilarity 21
21 A new paradigm for brain function From structure to dynamics to function Anatomical vs dynamical networks Anatomy structure; dynamics function The brain as a biophysical object Observed activity as the result of an evolutionary process :Morphospaces Efficiency and costs e.g. SW: high efficiency for low wiring costs Robustness and Adaptativity E.g. modularity Characterizing brain disease and cognitive function Anatomical networks, Resting state, Task-activated dynamical networks Relationships between them? Healthy brains vs. psychiatric/neurological diseases 22
22 Detecting alerts: the case of epilepsy Seizure etiology and propagation Abnormal pattern of synchronization across brain regions Focal, multifocal, extended support Spatio-temporal nature of seizure propagation Plurality of predictors [behavioural, neurophysiological] Are they related to each other? } Seizure detection (retroactive or in real time) Spiking activity even in normal brains Seizure prediction (proactive) Nonlinear correlations Sensitivity vs. Specificity 23
23 Building networks from experimental data Define the network nodes. Estimate a metric of association between nodes. Generate an association matrix and apply a threshold to each element adjacency matrix or undirected graph. Calculate network parameters of interest (compare to population of random networks). 24
24 Building Networks Eguiluz et al. (2005) 25
25 Functional networks as correlation
26 Functional networks as causality
27 Networks and Security 28
28 Credit card fraud Detecting clusters of similar users Peer group analysis: system that allows identifying accounts that are behaving differently from others at one moment in time whereas they were behaving the same previously. Normal behavior Suspected fraud Bolton, R. J., & Hand, D. J. (2001). Unsupervised profiling methods for fraud detection. Credit Scoring and Credit Control VII,
29 Credit card fraud Detecting clusters of similar users Problem: Complexity of defining similarity Why functional networks? Great flexibility in the type of co-occurrence Relationships can be non-linear 30
30 Credit card fraud Detecting clusters of similar users Problem: Why functional networks? Difficulty in detecting groups of users Sub-networks are not complete: A may be similar to B, B to C, but A and C may be different Detecting meso-scales and communities in real data sets Serrà, J., Zanin, M., Herrera, P., & Serra, X. (2012). Characterization and exploitation of community structure in cover song networks. Pattern Recognition Letters, 33 (9),
31 Credit card fraud Detecting clusters of similar users Problem: Why functional networks? Changes in groups. For instance, a student that starts working thus changing his/her habits Meso-scale goes beyond a single group Analysis of time-varying networks 32
32 Credit card fraud Detecting clusters of similar stores Similarly to peer group analysis, it is possible to detect groups of similar stores. Problems: Store name is not fully identifying, as a single entity may use different names Low volume stores may not have the same risk as their peer group The solution: content analysis using functional networks Stores are connected when realizing similar transactions in similar volumes Use of text mining to complement low-level numerical information Possible use of multi-layer structures Detecting and measuring risk with predictive models using content mining US B1
33 Credit card fraud Forecasting legal transactions Why analyzing transactions, when they can be forecasted? Detect patterns in the use of credit card, to forecast a legal transaction before its realization Similar to recommender systems in on-line stores Zanin, M., Cano, P., Buldú, J. M., & Celma, O. (2008, January). Complex networks in recommendation systems. In Proc. 2nd WSEAS Int. Conf. on Computer Engineering and Applications, Acapulco, Mexico. Lü, L., Medo, M., Yeung, C. H., Zhang, Y. C., Zhang, Z. K., & Zhou, T. (2012). Recommender systems. Physics Reports, 519(1),
34 Network security Spatio-temporal correlations Attacks to a network are usually distributed among its nodes. Moreover, attacks against a network may also involve multiple steps: evidence is typically distributed over time as well. Computer networks as dynamical systems Events as observables of their dynamics Jiang, G., & Cybenko, G. (2004, June). Temporal and spatial distributed event correlation for network security. In American Control Conference, Proceedings of the 2004 (Vol. 2, pp ). 35 IEEE.
35 High-level semantic Low-level data Network security Spatio-temporal correlations Types of observables: Firewall warning Intrusion Detection System (IDS) alerts Software log files Internet and Ethernet communications Users and programs activity CPU and memory load 36
36 Network security Spatio-temporal correlations Major problem: High number of false alarms Reconstruct the topological space of true alarms Pairwise connected when they co-occur in a real attack Nodes represent alarms 37
37 Network security Advantages: Spatio-temporal correlations 1. Strengthens the diagnosis 2. Reduces the overall number of alarms 3. Improves the content of the alarms Morin, B., & Debar, H. (2003, January). Correlation of intrusion symptoms: an application of chronicles. In Recent Advances in Intrusion Detection (pp ). Springer Berlin Heidelberg. 38
38 Network security Spatio-temporal correlations What about causality? Reconstruct functional networks based on causality relations between alerts Cascade effect Cascade effect Root alert 39
39 Network security Advantages: Spatio-temporal correlations 1. Post-event analysis of attacks 2. Identification of root alarms, i.e. those acting at the beginning of the attack 3. Identification of redundant alarms Lee, W., & Qin, X. (2005). Statistical causality analysis of INFOSEC alert data. In Managing Cyber Threats (pp ). Springer 40 US.
40 Network security Spatio-temporal correlations Alternative solution: Monitoring the appearance of some standard attack patterns Pattern 1 Pattern 2 Pattern n 41
41 Network security Major problem: Spatio-temporal correlations The system is reactive, in that the same (or very similar) patterns should have appeared in the past Pattern matching cannot work under unknown conditions! 42
42 Network security Spatio-temporal correlations Problem: Reactive vs. proactive system Why functional networks? Detect variations from a normal (base-line) network The red node is not expected to be central Security alert 43
43 Conclusions Substantial similarities between issues encountered when studying normal and pathological brain activity on the one hand, and information systems security on the other hand. Functional networks (and the tools of graph analysis and complex network theory) can be used to tackle some of these common problems 44
44 45
A Hierarchial Model for Visual Perception
A Hierarchial Model for Visual Perception Bolei Zhou 1 and Liqing Zhang 2 1 MOE-Microsoft Laboratory for Intelligent Computing and Intelligent Systems, and Department of Biomedical Engineering, Shanghai
More informationAlgorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov
Algorithms and Applications in Social Networks 2017/2018, Semester B Slava Novgorodov 1 Lesson #1 Administrative questions Course overview Introduction to Social Networks Basic definitions Network properties
More informationProperties of Biological Networks
Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási
More informationEffect of age and dementia on topology of brain functional networks. Paul McCarthy, Luba Benuskova, Liz Franz University of Otago, New Zealand
Effect of age and dementia on topology of brain functional networks Paul McCarthy, Luba Benuskova, Liz Franz University of Otago, New Zealand 1 Structural changes in aging brain Age-related changes in
More informationInternational Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at
Performance Evaluation of Ensemble Method Based Outlier Detection Algorithm Priya. M 1, M. Karthikeyan 2 Department of Computer and Information Science, Annamalai University, Annamalai Nagar, Tamil Nadu,
More informationSELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE
SELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE Guido Caldarelli IMT, CNR-ISC and LIMS, London UK DTRA Grant HDTRA1-11-1-0048 INTRODUCTION The robustness and the shape Baran, P. On distributed Communications
More informationAn Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization
An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization Pedro Ribeiro (DCC/FCUP & CRACS/INESC-TEC) Part 1 Motivation and emergence of Network Science
More informationWhat is a network? Network Analysis
What is a network? Network Analysis Valerie Cardenas Nicolson Associate Adjunct Professor Department of Radiology and Biomedical Imaging Complex weblike structures Cell is network of chemicals connected
More informationNetworks in economics and finance. Lecture 1 - Measuring networks
Networks in economics and finance Lecture 1 - Measuring networks What are networks and why study them? A network is a set of items (nodes) connected by edges or links. Units (nodes) Individuals Firms Banks
More informationA Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks
A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of
More informationCTI Capability Maturity Model Marco Lourenco
1 CTI Capability Maturity Model Cyber Threat Intelligence Course NIS Summer School 2018, Crete October 2018 MARCO LOURENCO - ENISA Cyber Security Analyst Lead European Union Agency for Network and Information
More informationImproving the Efficiency of Fast Using Semantic Similarity Algorithm
International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Improving the Efficiency of Fast Using Semantic Similarity Algorithm D.KARTHIKA 1, S. DIVAKAR 2 Final year
More informationDifferent attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT
Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT environment (e.g., Windows vs Linux) Levels of abstraction
More informationAn Introduction to Complex Systems Science
DEIS, Campus of Cesena Alma Mater Studiorum Università di Bologna andrea.roli@unibo.it Disclaimer The field of Complex systems science is wide and it involves numerous themes and disciplines. This talk
More informationReal-Time Model-Free Detection of Low-Quality Synchrophasor Data
Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Meng Wu and Le Xie Department of Electrical and Computer Engineering Texas A&M University College Station, TX NASPI Work Group meeting March
More informationBasics of Network Analysis
Basics of Network Analysis Hiroki Sayama sayama@binghamton.edu Graph = Network G(V, E): graph (network) V: vertices (nodes), E: edges (links) 1 Nodes = 1, 2, 3, 4, 5 2 3 Links = 12, 13, 15, 23,
More informationBUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks
1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms
More informationPerformance Analysis of A Feed-Forward Artifical Neural Network With Small-World Topology
Available online at www.sciencedirect.com Procedia Technology (202 ) 29 296 INSODE 20 Performance Analysis of A Feed-Forward Artifical Neural Network With Small-World Topology Okan Erkaymaz a, Mahmut Özer
More informationUser Signature Identification and Image Pixel Pattern Verification
Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image
More informationImage Classification Using Wavelet Coefficients in Low-pass Bands
Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan
More informationRelative Constraints as Features
Relative Constraints as Features Piotr Lasek 1 and Krzysztof Lasek 2 1 Chair of Computer Science, University of Rzeszow, ul. Prof. Pigonia 1, 35-510 Rzeszow, Poland, lasek@ur.edu.pl 2 Institute of Computer
More informationR. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India
Volume 7, Issue 4, April 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Service Ranking
More informationSampling Large Graphs for Anticipatory Analysis
Sampling Large Graphs for Anticipatory Analysis Lauren Edwards*, Luke Johnson, Maja Milosavljevic, Vijay Gadepally, Benjamin A. Miller IEEE High Performance Extreme Computing Conference September 16, 2015
More informationClimate Precipitation Prediction by Neural Network
Journal of Mathematics and System Science 5 (205) 207-23 doi: 0.7265/259-529/205.05.005 D DAVID PUBLISHING Juliana Aparecida Anochi, Haroldo Fraga de Campos Velho 2. Applied Computing Graduate Program,
More informationCS-E5740. Complex Networks. Network analysis: key measures and characteristics
CS-E5740 Complex Networks Network analysis: key measures and characteristics Course outline 1. Introduction (motivation, definitions, etc. ) 2. Static network models: random and small-world networks 3.
More informationA new predictive image compression scheme using histogram analysis and pattern matching
University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching
More informationLocating ego-centers in depth for hippocampal place cells
204 5th Joint Symposium on Neural Computation Proceedings UCSD (1998) Locating ego-centers in depth for hippocampal place cells Kechen Zhang,' Terrence J. Sejeowski112 & Bruce L. ~cnau~hton~ 'Howard Hughes
More informationAnomaly Detection in Communication Networks
Anomaly Detection in Communication Networks Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview u u
More informationData Sources for Cyber Security Research
Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,
More informationScalable Experimental Network of Excitable Boolean Nodes
Scalable Experimental Network of Excitable Boolean Nodes David P. Rosin 1,2,*, Damien Rontani 1, Daniel J. Gauthier 1 and Eckehard Schöll 2 Dynamics Days US 2012, Baltimore, Maryland, USA 1 Duke University,
More informationCyber attack detection using decision tree approach
Cyber attack detection using decision tree approach Amit Shinde Department of Industrial Engineering, Arizona State University,Tempe, AZ, USA {amit.shinde@asu.edu} In this information age, information
More informationAvailable Online through
Available Online through www.ijptonline.com ISSN: 0975-766X CODEN: IJPTFI Research Article ANALYSIS OF CT LIVER IMAGES FOR TUMOUR DIAGNOSIS BASED ON CLUSTERING TECHNIQUE AND TEXTURE FEATURES M.Krithika
More informationDetect Cyber Threats with Securonix Proxy Traffic Analyzer
Detect Cyber Threats with Securonix Proxy Traffic Analyzer Introduction Many organizations encounter an extremely high volume of proxy data on a daily basis. The volume of proxy data can range from 100
More informationENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION
International Journal of Power Control and Computation(IJPCSC) Vol 8. No.1 2016 Pp.44-50 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0976-268X ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG
More informationFlexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data
Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data B. Sumudu U. Mendis Department of Computer Science The Australian National University Canberra, ACT 0200,
More informationCity, University of London Institutional Repository
City Research Online City, University of London Institutional Repository Citation: Andrienko, N., Andrienko, G., Fuchs, G., Rinzivillo, S. & Betz, H-D. (2015). Real Time Detection and Tracking of Spatial
More informationA Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid
A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication
More informationResponse Network Emerging from Simple Perturbation
Journal of the Korean Physical Society, Vol 44, No 3, March 2004, pp 628 632 Response Network Emerging from Simple Perturbation S-W Son, D-H Kim, Y-Y Ahn and H Jeong Department of Physics, Korea Advanced
More informationHandling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization
Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,
More informationA Comparative Study of SVM Kernel Functions Based on Polynomial Coefficients and V-Transform Coefficients
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 3 March 2017, Page No. 20765-20769 Index Copernicus value (2015): 58.10 DOI: 18535/ijecs/v6i3.65 A Comparative
More informationPerformance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM
Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.
More informationSecond Session (only if there should still be places available after the first one)
Ph.D course in Astrophysics Early Universe Physics Galaxies Stellar Evolution Gravitation Theory High Energy Astrophysics Large Scale Structure Relativistic Astrophysics Prof. Carlo Baccigalupi Astrophysics
More informationA Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da
More informationMass Classification Method in Mammogram Using Fuzzy K-Nearest Neighbour Equality
Mass Classification Method in Mammogram Using Fuzzy K-Nearest Neighbour Equality Abstract: Mass classification of objects is an important area of research and application in a variety of fields. In this
More informationFuzzy Intrusion Detection
Fuzzy Intrusion Detection John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson Electrical and Computer Engineering Department Iowa State University Ames, IA, USA {jedicker,juslin,koukouso,julied}@iastate.edu
More informationCommunity detection. Leonid E. Zhukov
Community detection Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics Network Science Leonid E.
More informationHillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
More informationAnomaly Detection on Data Streams with High Dimensional Data Environment
Anomaly Detection on Data Streams with High Dimensional Data Environment Mr. D. Gokul Prasath 1, Dr. R. Sivaraj, M.E, Ph.D., 2 Department of CSE, Velalar College of Engineering & Technology, Erode 1 Assistant
More informationMultivariate Correlation Analysis based detection of DOS with Tracebacking
1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor
More informationA Naïve Soft Computing based Approach for Gene Expression Data Analysis
Available online at www.sciencedirect.com Procedia Engineering 38 (2012 ) 2124 2128 International Conference on Modeling Optimization and Computing (ICMOC-2012) A Naïve Soft Computing based Approach for
More informationSalient Region Detection and Segmentation in Images using Dynamic Mode Decomposition
Salient Region Detection and Segmentation in Images using Dynamic Mode Decomposition Sikha O K 1, Sachin Kumar S 2, K P Soman 2 1 Department of Computer Science 2 Centre for Computational Engineering and
More informationContextual Co-occurrence Information for Object Representation and Categorization
Vol.8, No.1 (2015), pp.95-104 http://dx.doi.org/10.14257/ijdta.2015.8.1.11 Contextual Co-occurrence Information for Object Representation and Categorization 1 Soheila Sheikhbahaei and 2 Zahra Sadeghi 1
More informationBehavioral Analysis for Intrusion Resilience. Ahmed Fawaz Dec 6, 2016
Behavioral Analysis for Intrusion Resilience Ahmed Fawaz Dec 6, 2016 1 Recent Cyber Attacks on Private and Public Entities 2 Design for Resiliency Diverse Monitoring Secure Monitoring Monitoring Fusion
More informationResource Usage Monitoring for Web Systems Using Real-time Statistical Analysis of Log Data
Resource Usage Monitoring for Web Systems Using Real- Statistical Analysis of Log Data MATSUKI YOSHINO, ATSURO HANDA Software Division, Hitachi Ltd. 53, Totsuka-cho, Totsuka-ku, Yokohama, 244-8555 JAPAN
More informationDeep Tensor: Eliciting New Insights from Graph Data that Express Relationships between People and Things
Deep Tensor: Eliciting New Insights from Graph Data that Express Relationships between People and Things Koji Maruhashi An important problem in information and communications technology (ICT) is classifying
More informationVideo Syntax Analysis
1 Video Syntax Analysis Wei-Ta Chu 2008/10/9 Outline 2 Scene boundary detection Key frame selection 3 Announcement of HW #1 Shot Change Detection Goal: automatic shot change detection Requirements 1. Write
More informationEuropean Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105
European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based
More informationThe Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis
Journal of Materials, Processing and Design (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Xueyi Bai1,a,
More informationGene Clustering & Classification
BINF, Introduction to Computational Biology Gene Clustering & Classification Young-Rae Cho Associate Professor Department of Computer Science Baylor University Overview Introduction to Gene Clustering
More informationDDoS Attack Detection Using Moment in Statistics with Discriminant Analysis
DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis Pradit Pitaksathienkul 1 and Pongpisit Wuttidittachotti 2 King Mongkut s University of Technology North Bangkok, Thailand 1 praditp9@gmail.com
More informationA graph theoretical approach for a multistep mapping software for the FACETS project
A graph theoretical approach for a multistep mapping software for the FACETS project Karsten Wendt Technische Universität Dresden ETIT/IEE - HPSN D-01062 Dresden GERMANY wendt@iee.et.tu-dresden.de Matthias
More informationImage Segmentation Techniques for Object-Based Coding
Image Techniques for Object-Based Coding Junaid Ahmed, Joseph Bosworth, and Scott T. Acton The Oklahoma Imaging Laboratory School of Electrical and Computer Engineering Oklahoma State University {ajunaid,bosworj,sacton}@okstate.edu
More informationNeuromorphic Hardware. Adrita Arefin & Abdulaziz Alorifi
Neuromorphic Hardware Adrita Arefin & Abdulaziz Alorifi Introduction Neuromorphic hardware uses the concept of VLSI systems consisting of electronic analog circuits to imitate neurobiological architecture
More informationStability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps
Stability Assessment of Electric Power Systems using Growing Gas and Self-Organizing Maps Christian Rehtanz, Carsten Leder University of Dortmund, 44221 Dortmund, Germany Abstract. Liberalized competitive
More informationGraph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS.
Graph Theory COURSE: Introduction to Biological Networks LECTURE 1: INTRODUCTION TO NETWORKS Arun Krishnan Koenigsberg, Russia Is it possible to walk with a route that crosses each bridge exactly once,
More informationApplying Supervised Learning
Applying Supervised Learning When to Consider Supervised Learning A supervised learning algorithm takes a known set of input data (the training set) and known responses to the data (output), and trains
More informationEfficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest.
Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. D.A. Karras, S.A. Karkanis and D. E. Maroulis University of Piraeus, Dept.
More informationIntroduction to ANSYS DesignXplorer
Lecture 4 14. 5 Release Introduction to ANSYS DesignXplorer 1 2013 ANSYS, Inc. September 27, 2013 s are functions of different nature where the output parameters are described in terms of the input parameters
More informationA Novel Technique for Finding Influential Nodes
A Novel Technique for Finding Influential Nodes Mini Singh Ahuja Department of Computer science, Guru Nanak Dev University, Regional Campus, Gurdaspur Abstract In complex networks there is a big issue
More informationCHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION
CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationNETWORK FAULT DETECTION - A CASE FOR DATA MINING
NETWORK FAULT DETECTION - A CASE FOR DATA MINING Poonam Chaudhary & Vikram Singh Department of Computer Science Ch. Devi Lal University, Sirsa ABSTRACT: Parts of the general network fault management problem,
More informationMachine Learning in Biology
Università degli studi di Padova Machine Learning in Biology Luca Silvestrin (Dottorando, XXIII ciclo) Supervised learning Contents Class-conditional probability density Linear and quadratic discriminant
More informationPattern Mining in Frequent Dynamic Subgraphs
Pattern Mining in Frequent Dynamic Subgraphs Karsten M. Borgwardt, Hans-Peter Kriegel, Peter Wackersreuther Institute of Computer Science Ludwig-Maximilians-Universität Munich, Germany kb kriegel wackersr@dbs.ifi.lmu.de
More informationInternational Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani
LINK MINING PROCESS Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani Higher Colleges of Technology, United Arab Emirates ABSTRACT Many data mining and knowledge discovery methodologies and process models
More informationLevel-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN
Vol. 2, Special Issue 1, December 20 Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN Shilpa Alias 1, Simy M Baby 2 M. Tech Student, Dept. Applied Electronics, Ilahia
More informationANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS
ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,
More informationComparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio
Comparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio Adela Ioana Tudor, Adela Bâra, Simona Vasilica Oprea Department of Economic Informatics
More informationColor-Based Classification of Natural Rock Images Using Classifier Combinations
Color-Based Classification of Natural Rock Images Using Classifier Combinations Leena Lepistö, Iivari Kunttu, and Ari Visa Tampere University of Technology, Institute of Signal Processing, P.O. Box 553,
More informationOnline Bad Data Detection for Synchrophasor Systems via Spatio-temporal Correlations
LOGO Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal s Le Xie Texas A&M University NASPI International Synchrophasor Symposium March 24, 2016 Content 1 Introduction 2 Technical
More informationBig Data Challenges in Large IP Networks
Big Data Challenges in Large IP Networks Feature Extraction & Predictive Alarms for network management Wednesday 28 th Feb 2018 Dave Yearling British Telecommunications plc 2017 What we will cover Making
More informationALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT Xiaojia He 1 and Natarajan Meghanathan 2 1 University of Georgia, GA, USA, 2 Jackson State University, MS, USA 2 natarajan.meghanathan@jsums.edu
More informationThis shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict
1 This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict access between segments This creates a layered defense
More informationIntroductory Concepts for Voxel-Based Statistical Analysis
Introductory Concepts for Voxel-Based Statistical Analysis John Kornak University of California, San Francisco Department of Radiology and Biomedical Imaging Department of Epidemiology and Biostatistics
More informationAUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID
AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern
More informationExtracting Information from Complex Networks
Extracting Information from Complex Networks 1 Complex Networks Networks that arise from modeling complex systems: relationships Social networks Biological networks Distinguish from random networks uniform
More informationLink-Based Wormhole Detection in Wireless Sensor Networks
Link-Based Wormhole Detection in Wireless Sensor Networks Xiaoyuan Zhou, Lijun Chen National Key Laboratory for Novel Software Technology Nanjing University Nanjing, P.R. China, 2123 zxy@smail.nju.edu.cn,
More informationAn Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks
An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation
More informationStructural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques
Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,
More informationFailure in Complex Social Networks
Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon
More informationC. Poultney S. Cho pra (NYU Courant Institute) Y. LeCun
Efficient Learning of Sparse Overcomplete Representations with an Energy-Based Model Marc'Aurelio Ranzato C. Poultney S. Cho pra (NYU Courant Institute) Y. LeCun CIAR Summer School Toronto 2006 Why Extracting
More informationNick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell
Nick Hamilton Institute for Molecular Bioscience Essential Graph Theory for Biologists Image: Matt Moores, The Visible Cell Outline Core definitions Which are the most important bits? What happens when
More informationIntelligent Network Management Using Graph Differential Anomaly Visualization Qi Liao
Intelligent Network Management Using Graph Differential Anomaly Visualization Qi Liao Network Management What is going on in the network? Public servers Private servers Wireless Users DMZ Applications
More informationSparse Models in Image Understanding And Computer Vision
Sparse Models in Image Understanding And Computer Vision Jayaraman J. Thiagarajan Arizona State University Collaborators Prof. Andreas Spanias Karthikeyan Natesan Ramamurthy Sparsity Sparsity of a vector
More informationUMOBILE ACM ICN 2017 Tutorial Opportunistic wireless aspects in NDN
UMOBILE ACM ICN 2017 Tutorial Opportunistic wireless aspects in NDN ACM ICN 2017 Berlin 26.09.2017 Paulo Mendes, COPELABS / University Lusofona (paulo.mendes@ulusofona.pt) Omar Aponte, COPELABS / University
More informationImage Inpainting Using Sparsity of the Transform Domain
Image Inpainting Using Sparsity of the Transform Domain H. Hosseini*, N.B. Marvasti, Student Member, IEEE, F. Marvasti, Senior Member, IEEE Advanced Communication Research Institute (ACRI) Department of
More informationEvolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract)
Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Kevin P. Anchor, Paul D. Williams, Gregg H. Gunsch, and Gary B. Lamont Department of Electrical and Computer
More informationFCA-based Search for Duplicate objects in Ontologies
FCA-based Search for Duplicate objects in Ontologies Dmitry A. Ilvovsky and Mikhail A. Klimushkin National Research University Higher School of Economics, School of Applied Mathematics and Informational
More informationVariable Selection 6.783, Biomedical Decision Support
6.783, Biomedical Decision Support (lrosasco@mit.edu) Department of Brain and Cognitive Science- MIT November 2, 2009 About this class Why selecting variables Approaches to variable selection Sparsity-based
More informationIntroduction to Data Mining
Introduction to JULY 2011 Afsaneh Yazdani What motivated? Wide availability of huge amounts of data and the imminent need for turning such data into useful information and knowledge What motivated? Data
More information