In the previous blog I explained the theory behind and how a Convolutional Neural Network works for a classification task. Here I will go a step further and touch on techniques used for object…
Visualization of graph data is incredibly challenging, particularly when it comes to extremely large, scale-free graphs and social networks. A few simple searches on the Web and you will find some mesmerizing and very cool images. Perhaps the most cited...
What is Snort?
Snort® is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry.
A. Hotho, R. Jäschke, C. Schmitz, und G. Stumme. Proceedings of the First International Conference on Semantic and Digital Media Technologies, Seite 56--70. Berlin, Heidelberg, Springer-Verlag, (2006)
A. Mislove, B. Viswanath, K. Gummadi, und P. Druschel. Proceedings of the Third ACM International Conference on Web Search and Data Mining, Seite 251--260. New York, NY, USA, ACM, (2010)
J. Yang, und J. Leskovec. Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, Seite 587--596. New York, NY, USA, ACM, (2013)
J. Lin, E. Keogh, S. Lonardi, und B. Chiu. Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, Seite 2--11. New York, NY, USA, ACM, (2003)
J. Lehmann, B. Gonçalves, J. Ramasco, und C. Cattuto. Proceedings of the 21st International Conference on World Wide Web, Seite 251--260. New York, NY, USA, ACM, (2012)
H. Cheng, Y. Liang, X. Xing, X. Liu, R. Han, Q. Lv, und S. Mishra. Proceedings of the fifth ACM international conference on Web search and data mining, Seite 23--32. New York, NY, USA, ACM, (2012)