What drives a donor? A machine learning‐based approach for predicting responses of nonprofit direct marketing campaigns

D Cacciarelli, M Boresta - Journal of Philanthropy and …, 2022 - Wiley Online Library
Direct marketing campaigns are one of the main fundraising sources for nonprofit
organizations and their effectiveness is crucial for the sustainability of the organizations. The …

Self-adaptive root cause diagnosis for large-scale microservice architecture

M Ma, W Lin, D Pan, P Wang - IEEE Transactions on Services …, 2020 - ieeexplore.ieee.org
The emergence of microservice architecture in Cloud systems poses a new challenges for
the reliability operation and maintenance. Due to numerous services and diverse types of …

Benford's law behavior of Internet traffic

L Arshadi, AH Jahangir - Journal of Network and Computer Applications, 2014 - Elsevier
In this paper, we analyze the Internet traffic from a different point of view based on Benford's
law, an empirical law that describes the distribution of leading digits in a collection of …

Online anomaly detection using KDE

T Ahmed - GLOBECOM 2009-2009 IEEE Global …, 2009 - ieeexplore.ieee.org
Large backbone networks are regularly affected by a range of anomalies. This paper
presents an online anomaly detection algorithm based on Kernel Density Estimates. The …

Classification of BGP anomalies using decision trees and fuzzy rough sets

Y Li, HJ Xing, Q Hua, XZ Wang, P Batta… - … on Systems, Man …, 2014 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the core component of the Internet's routing infrastructure.
Abnormal routing behavior impairs global Internet connectivity and stability. Hence …

Probabilistic local reconstruction for k-NN regression and its application to virtual metrology in semiconductor manufacturing

S Lee, P Kang, S Cho - Neurocomputing, 2014 - Elsevier
The “locally linear reconstruction”(LLR) provides a principled and k-insensitive way to
determine the weights of k-nearest neighbor (k-NN) learning. LLR, however, does not …

Network traffic anomaly detection using clustering techniques and performance comparison

D Liu, CH Lung, I Lambadaris… - 2013 26th IEEE …, 2013 - ieeexplore.ieee.org
Real-time network traffic anomaly detection is crucial for the confidentiality, integrity, and
security of network information. Machine learning approaches are widely used to distinguish …

Hypergraph-based anomaly detection of high-dimensional co-occurrences

J Silva, R Willett - IEEE transactions on pattern analysis and …, 2008 - ieeexplore.ieee.org
This paper addresses the problem of detecting anomalous multivariate co-occurrences
using a limited number of unlabeled training observations. A novel method based on using a …

[HTML][HTML] Distributed detection of sequential anomalies in univariate time series

J Schneider, P Wenig, T Papenbrock - The VLDB Journal, 2021 - Springer
The automated detection of sequential anomalies in time series is an essential task for many
applications, such as the monitoring of technical systems, fraud detection in high-frequency …

GML learning, a generic machine learning model for network measurements analysis

P Casas, J Vanerio, K Fukuda - 2017 13th International …, 2017 - ieeexplore.ieee.org
The application of machine learning models to the analysis of network measurement
problems has largely increased in the last decade; however, there is still no clear best …