BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Eastern
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20231105T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20231129T021019Z
UID:FCB81B70-F7D1-4A16-AC85-A4897DBCCCD8
DTSTART;TZID=US/Eastern:20231128T180000
DTEND;TZID=US/Eastern:20231128T190000
DESCRIPTION:Collection and analysis of data from deployed networks is essen
 tial for understanding modern communication networks. Data mining and stat
 istical analysis of network data are often employed to determine traffic l
 oads\, analyze patterns of users&#39; behavior\, and predict future network tr
 affic while various machine learning techniques proved valuable for predic
 ting anomalous traffic behavior. In described case studies\, traffic trace
 s collected from various deployed networks and the Internet are used to ch
 aracterize and model network traffic\, analyze Internet topologies\, and c
 lassify network anomalies.\n\nSpeaker(s): Ljiljana Trajkovic\, \n\nAgenda:
  \n6:00 PM - Welcome and Introductions\, Chapter business update\;\n6:05 P
 M - Technical Talk\n7:00 PM - End of technical Talk\, Start of Q &amp; A\n7:15
  PM - Wrap Up!\n\n/* ALL TIMES are USA EST/EDT */\n\nVirtual: https://even
 ts.vtools.ieee.org/m/382095
LOCATION:Virtual: https://events.vtools.ieee.org/m/382095
ORGANIZER:sharan.kalwani@ieee.org
SEQUENCE:31
SUMMARY:Data Mining and Machine Learning for Analysis of Network Traffic
URL;VALUE=URI:https://events.vtools.ieee.org/m/382095
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Collection and analysis of data from deplo
 yed networks is essential for understanding modern communication networks.
  Data mining and statistical analysis of network data are often employed t
 o determine traffic loads\, analyze patterns of users&#39; behavior\, and pred
 ict future network traffic while various machine learning techniques prove
 d valuable for predicting anomalous traffic behavior. In described case st
 udies\, traffic traces collected from various deployed networks and the In
 ternet are used to characterize and model network traffic\, analyze Intern
 et topologies\, and classify network anomalies.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br
  /&gt;&lt;p&gt;&lt;span style=&quot;font-family: courier new\,courier\,monospace\; font-siz
 e: 14pt\;&quot;&gt;6:00 PM - Welcome and Introductions\, Chapter business update\;
  &lt;br /&gt;6&lt;/span&gt;&lt;span style=&quot;font-family: courier new\,courier\,monospace\;
  font-size: 14pt\;&quot;&gt;:05 PM - Technical Talk &lt;br /&gt;7&lt;/span&gt;&lt;span style=&quot;fon
 t-family: courier new\,courier\,monospace\; font-size: 14pt\;&quot;&gt;:00 PM - En
 d of technical Talk\, Start of Q &amp;amp\; A&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-fa
 mily: courier new\,courier\,monospace\; font-size: 14pt\;&quot;&gt;7:15 PM - Wrap 
 Up&lt;/span&gt;&lt;span style=&quot;font-family: courier new\,courier\,monospace\; font-
 size: 14pt\;&quot;&gt;!&lt;/span&gt;&lt;/p&gt;\n&lt;p&gt;&lt;span style=&quot;color: #e03e2d\;&quot;&gt;&lt;strong&gt;/* A
 LL TIMES are USA EST/EDT */&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

