In this article, the author demystifies the business of encrypting and decrypting network traffic, and translates arcane terms such as https, ssh, sftp, etc.
GloVe + character embeddings + bi-LSTM + CRF for Sequence Tagging (Named Entity Recognition, NER, POS) - NLP example of bidirectionnal RNN and CRF in Tensorflow
H. Yu, J. Han, und K. Chang. Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seite 239--248. New York, NY, USA, ACM, (2002)
K. Becker, G. Stumme, R. Wille, U. Wille, und M. Zickwolff. Knowledge Engineering and Knowledge Management Methods, Models, and Tools, Volume 1937 von Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, (2000)
G. Stumme, R. Wille, und U. Wille. Principles of Data Mining and Knowledge Discovery, Volume 1510 von Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, (1998)
J. Hereth, G. Stumme, R. Wille, und U. Wille. Conceptual Structures: Logical, Linguistic, and Computational Issues, Volume 1867 von Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, (2000)