Now showing items 1-4 of 4
Generation of the database gurekddcup
The database gureKDDCup has been generated within the UADI project (Unsupervised Anomaly Detection for Intrusion detection system) in which a classifier that detects intrusions or attacks in network based systems was ...
PIM-SM extension for Source-Specific Multicast through non multicast networks
Deployment of multicast in the open Internet is stagnated, mainly as a result of service provider policies and network limitations. To skip the lack of multicast connectivity between receivers and networks that carry traffic ...
An update of the J48Consolidated WEKA’s class: CTC algorithm enhanced with the notion of coverage
This document aims to describe an update of the implementation of the J48Consolidated class within WEKA platform. The J48Consolidated class implements the CTC algorithm  which builds a unique decision tree based on ...
J48Consolidated: an implementation of CTC algorithm for WEKA
The CTC algorithm, Consolidated Tree Construction algorithm, is a machine learning paradigm that was designed to solve a class imbalance problem, a fraud detection problem in the area of car insurance  where, besides, ...