Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, rec ....Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, recently
developed algorithms to estimate the support of a distribution and
detect rare events will be employed in this context.
The project is in cooperation with Dr. Ralf Herbrich (Microsoft
Research, Cambridge).
Read moreRead less
Computer Vision Optimization Problems Using Machine Learning. Computer Vision concerns itself with understanding the world through the analysis of images obtained by a video or still camera. An important application is tracking of people in video and modelling their movements. This has evident applications in security, sport and entertainment. By enabling the computer to capture the motion of a subject in a video, we may detect suspicious activity in security, analyze the motion (golf-swing, ....Computer Vision Optimization Problems Using Machine Learning. Computer Vision concerns itself with understanding the world through the analysis of images obtained by a video or still camera. An important application is tracking of people in video and modelling their movements. This has evident applications in security, sport and entertainment. By enabling the computer to capture the motion of a subject in a video, we may detect suspicious activity in security, analyze the motion (golf-swing, diving style) of a sports-person, or capture the motion of an actor for animation or game applications. Development of a reliable technology requires new optimization techniques, which will place Australia at the forefront of the application of such research, commercially and for the public benefit.Read moreRead less