Machine learning and data mining for Comprehensive Test Ban Treaty monitoring

S Russell, S Vaidya - 2009 - osti.gov
The Comprehensive Test Ban Treaty (CTBT) is gaining renewed attention in light of growing
worldwide interest in mitigating risks of nuclear weapons proliferation and testing. Since the …

[PDF][PDF] Strategic initiative in support of CTBT data processing: vDEC (virtual Data Exploitation Centre)

S Vaidya, R Engdahl, R Le Bras, K Koch… - CTBTO International …, 2009 - academia.edu
The Comprehensive Test Ban Treaty (CTBT) is receiving renewed attention in the Obama
administration, in light of this administration's long range objective of steering towards a …

[图书][B] Monitoring a Comprehensive Test Ban Treaty

ES Husebye, AM Dainty - 2012 - books.google.com
An international treaty banning the testing of any nuclear device in any environment-a
comprehensive test ban treaty (CTBT)-has been on the political agenda for nearly 40 years …

Dmnaed: A novel framework based on dynamic memory network for abnormal event detection in enterprise networks

X Ren, L Wang - Advances in Knowledge Discovery and Data Mining …, 2019 - Springer
Abnormal event detection is a crucial step towards discovering insider threat in enterprise
networks. However, most existing anomaly detection approaches fail to capture latent …

Learning from experts' experience: toward automated cyber security data triage

C Zhong, J Yen, P Liu, RF Erbacher - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
Security operations centers (SOCs) employ various cyber defend measures to monitor
network events. Apart from these measures, SOCs also have to resort to human analysts to …

Motivating the inclusion of meteorological indicators in the ctbt feature-space

C Bellinger, N Japkowicz - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
Verification of the Comprehensive Test-Ban-Treaty (CTBT), as a Pattern Recognition (PR)
problem, has been proposed based on four radioxenon features. It has been noted …

[图书][B] Data mining techniques for network scan detection

GJ Simon - 2008 - search.proquest.com
A precursor to many attacks on networks is often a reconnaissance operation, more
commonly referred to as a scan. Despite the vast amount of attention focused on methods for …

[PDF][PDF] Deep Learning Based Event Identification for Reliable Monitoring of Nuclear Facilities

M Avalos, P Tsvetkov - aesl.engr.tamu.edu
Fuel cycle facilities are the facilities that use or alter nuclear material with the goal of energy
production. Where significant nuclear material will be handled and stored will directly relate …

Machine learning techniques for advanced cyber attack detection

W Yang - 2022 - dr.ntu.edu.sg
With the development of information communication technologies (ICT), more and more data
is generated, processed, and transmitted among different smart components and …

A Minimally Supervised Event Detection Method

M Hoffman, S Bussell, N Brown - … : Proceedings of the AHFE 2021 Virtual …, 2021 - Springer
Solving classification problems with machine learning often entails laborious manual
labeling of test data, requiring valuable time from a subject matter expert (SME). This …