Search Results for author: Richard Brunner

Found 3 papers, 0 papers with code

Forensic Data Analytics for Anomaly Detection in Evolving Networks

no code implementations17 Aug 2023 Li Yang, Abdallah Moubayed, Abdallah Shami, Amine Boukhtouta, Parisa Heidari, Stere Preda, Richard Brunner, Daniel Migault, Adel Larabi

In the prevailing convergence of traditional infrastructure-based deployment (i. e., Telco and industry operational networks) towards evolving deployments enabled by 5G and virtualization, there is a keen interest in elaborating effective security controls to protect these deployments in-depth.

Feature Engineering Intrusion Detection +1

Machine Learning for Performance-Aware Virtual Network Function Placement

no code implementations13 Jan 2020 Dimitrios Michael Manias, Manar Jammal, Hassan Hawilo, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner

The model takes several performance-related features from the network as an input and selects the placement of the various VNF instances on network servers with the objective of minimizing the delay between dependent VNF instances.

BIG-bench Machine Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.