A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

作者: Raouf Boutaba , Mohammad A. Salahuddin , Noura Limam , Sara Ayoubi , Nashid Shahriar

DOI: 10.1186/S13174-018-0087-2

关键词:

摘要: … and network security. In traffic engineering, we discuss traffic prediction, classification and routing … In performance optimization, we discuss application of ML techniques in the context of …

参考文章(417)
David J. Montana, Training feedforward neural networks using genetic algorithms international joint conference on artificial intelligence. pp. 762- 767 ,(1989)
Teuvo Kohonen, Self-organized formation of topologically correct feature maps Biological Cybernetics. ,vol. 43, pp. 509- 521 ,(1988) , 10.1007/BF00337288
David Lowe, David S. Broomhead, Radial Basis Functions, Multi-Variable Functional Interpolation and Adaptive Networks Complex Systems. ,vol. 2, pp. 321- 355 ,(1988)
Mostafa A. Salama, Heba F. Eid, Rabie A. Ramadan, Ashraf Darwish, Aboul Ella Hassanien, Hybrid Intelligent Intrusion Detection Scheme Springer, Berlin, Heidelberg. pp. 293- 303 ,(2011) , 10.1007/978-3-642-20505-7_26
Geoffrey E. Hinton, Ruslan Salakhutdinov, Deep Boltzmann machines international conference on artificial intelligence and statistics. pp. 448- 455 ,(2009)
Yann Le Cun, Learning Process in an Asymmetric Threshold Network NATO ASI series. Series F : computer and system sciences. ,vol. 20, pp. 233- 240 ,(1986) , 10.1007/978-3-642-82657-3_24
Naum N. Aizenberg, Igor N. Aizenberg, Joos P. Vandewalle, Multi-Valued and Universal Binary Neurons: Theory, Learning and Applications Kluwer Academic Publishers. ,(2000)
Anthony McGregor, Mark Hall, Perry Lorier, James Brunskill, Flow Clustering Using Machine Learning Techniques passive and active network measurement. ,vol. 3015, pp. 205- 214 ,(2004) , 10.1007/978-3-540-24668-8_21