no code implementations • 14 Sep 2023 • Dania Herzalla, Willian T. Lunardi, Martin Andreoni Lopez
The effectiveness of network intrusion detection systems, predominantly based on machine learning, are highly influenced by the dataset they are trained on.
Ranked #1 on Anomaly Detection on TII-SSRC-23
no code implementations • 3 May 2022 • Willian T. Lunardi, Martin Andreoni Lopez, Jean-Pierre Giacalone
With a convolutional \ac{AE}, ARCADE automatically builds a profile of the normal traffic using a subset of raw bytes of a few initial packets of network flows so that potential network anomalies and intrusions can be efficiently detected before they cause more damage to the network.
1 code implementation • 22 Jun 2020 • Willian T. Lunardi, Ernesto G. Birgin, Débora P. Ronconi, Holger Voos
This challenging real scheduling problem, that emerged in the nowadays printing industry, corresponds to a flexible job shop scheduling problem with sequencing flexibility; and it presents several complicating specificities such as resumable operations, periods of unavailability of the machines, sequence-dependent setup times, partial overlapping between operations with precedence constraints, and fixed operations, among others.