Learning and the unknown: Surveying steps toward open world recognition

…, S Cruz, AR Dhamija, M Gunther, J Henrydoss… - Proceedings of the AAAI …, 2019 - aaai.org
As science attempts to close the gap between man and machine by building systems capable
of learning, we must embrace the importance of the unknown. The ability to differentiate …

Incremental open set intrusion recognition using extreme value machine

J Henrydoss, S Cruz, EM Rudd… - 2017 16th IEEE …, 2017 - ieeexplore.ieee.org
Typically, most network intrusion detection systems use supervised learning techniques to
identify network anomalies. A problem exists when identifying the unknowns and …

Critical security review and study of DDoS attacks on LTE mobile network

J Henrydoss, T Boult - 2014 IEEE Asia Pacific Conference on …, 2014 - ieeexplore.ieee.org
Mobile network is currently evolving into data centric architecture. Long Term Evolution (LTE)
based next generation 4G technology is being deployed by cellular operators around the …

Enhancing open-set recognition using clustering-based extreme value machine (C-EVM)

J Henrydoss, S Cruz, C Li, M Günther… - … Conference on Big …, 2020 - ieeexplore.ieee.org
In real-world deployments, machine learning applications find challenges when accessing
ever-increasing volumes of data - the real world is open and often presents data from classes …

Open-Set Intrusion Recognition Using Extreme Value Machine

J Henrydoss - 2019 - search.proquest.com
Abstract Machine learning is continuously expanding as a sub-field of computer science
which evolved from pattern recognition and computational learning theory. Advancements in …

Study of Malware Threats Faced by the Typical Email User

A Ayodele, J Henrydoss, W Schrier, TE Boult - … , India, July 15-17, 2011 4, 2011 - Springer
Understanding malware behavior will help in implementing robust intrusion detection and
prevention systems. In this paper, we studied the behavioral characteristics of different …

Empirical Analysis of Learning-based Malware Detection Methods using Image Visualization

…, E Alhazmi, J Henrydoss - International Journal of …, 2022 - search.proquest.com
Malware, a short name for malicious software is an emerging cyber threat. Various researchers
have proposed ways to build advanced malware detectors that can mitigate threat actors …

A novel open set energy-based flow classifier for network intrusion detection

M Souza, C Pontes, J Gondim, LPF Garcia… - arXiv preprint arXiv …, 2021 - arxiv.org
… the coupling values 𝑒𝑠𝑖 𝑗 and local fields ℎ𝑠𝑖 from F𝑠, and define the threshold 𝑡𝑠 as
the 95th percentile of the energies of samples in F𝑠, calculated using 𝑒𝑠𝑖 𝑗 and ℎ𝑠𝑖 . To …

Advances in computing and information technology

N Meghanathan, D Nagamalai, N Chaki - Proceedings of the second …, 2012 - Springer
James Henrydoss AT&T and University of Colorado, USA Krzysztof Walkowiak Wroclaw
University of Technology, Poland Murugan D. Manonmaniam Sundaranar University, India …

[PDF][PDF] A novel security system for preventing DoS attacks on 4G LTE networks

S Ayyaz, MA Khan, J Ahmad, C Beard… - Proceedings of the …, 2016 - researchgate.net
With the emergence of new 4G LTE network, many new security threats have also appeared.
Unlike 2G and 3G, 4G uses IP based communication. Due to the excessive internet usage …