Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Artificial Intelligence and Robotics (1)
- Computer Sciences (1)
- Computer and Systems Architecture (1)
- Databases and Information Systems (1)
- Digital Communications and Networking (1)
-
- Electrical and Computer Engineering (1)
- Numerical Analysis and Scientific Computing (1)
- Other Computer Engineering (1)
- Physical Sciences and Mathematics (1)
- Science and Technology Studies (1)
- Social Statistics (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Systems Architecture (1)
- Systems and Communications (1)
Articles 1 - 2 of 2
Full-Text Articles in Computer Engineering
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki
Electronic Thesis and Dissertation Repository
Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data interaction, and …
Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan
Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan
Electronic Thesis and Dissertation Repository
A network intrusion is any unauthorized activity on a computer network. There are host-based and network-based Intrusion Detection Systems (IDS's), of which there are each signature-based and anomaly-based detection methods. An anomalous network behavior can be defined as an intentional violation of the expected sequence of packets. In a real-time network-based IDS, incoming packets are treated as a stream of data. A stream processor takes any stream of data or events and extracts interesting patterns on the fly. This representation allows applying statistical anomaly detection using sequence prediction algorithms as well as using a stream processor to perform signature-based intrusion …