Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Deep Learning Applications for Cyber...
~
SpringerLink (Online service)
Deep Learning Applications for Cyber Security
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Deep Learning Applications for Cyber Security/ edited by Mamoun Alazab, MingJian Tang.
other author:
Alazab, Mamoun.
Description:
XX, 246 p. 78 illus., 54 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Big data. -
Online resource:
https://doi.org/10.1007/978-3-030-13057-2
ISBN:
9783030130572
Deep Learning Applications for Cyber Security
Deep Learning Applications for Cyber Security
[electronic resource] /edited by Mamoun Alazab, MingJian Tang. - 1st ed. 2019. - XX, 246 p. 78 illus., 54 illus. in color.online resource. - Advanced Sciences and Technologies for Security Applications,1613-5113. - Advanced Sciences and Technologies for Security Applications,.
Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft -- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems -- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks -- Using Convolutional Neural Networks for Classifying Malicious Network Traffic -- DBD: Deep Learning DGA-based Botnet Detection -- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks -- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach -- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks -- Forensic Detection of Child Exploitation Material using Deep Learning -- Toward Detection of Child Exploitation Material: A Forensic Approach.
Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points. .
ISBN: 9783030130572
Standard No.: 10.1007/978-3-030-13057-2doiSubjects--Topical Terms:
981821
Big data.
LC Class. No.: QA76.9.B45
Dewey Class. No.: 005.7
Deep Learning Applications for Cyber Security
LDR
:03299nam a22004095i 4500
001
1015403
003
DE-He213
005
20200704121038.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030130572
$9
978-3-030-13057-2
024
7
$a
10.1007/978-3-030-13057-2
$2
doi
035
$a
978-3-030-13057-2
050
4
$a
QA76.9.B45
072
7
$a
UN
$2
bicssc
072
7
$a
COM021000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
005.7
$2
23
245
1 0
$a
Deep Learning Applications for Cyber Security
$h
[electronic resource] /
$c
edited by Mamoun Alazab, MingJian Tang.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XX, 246 p. 78 illus., 54 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
505
0
$a
Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft -- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems -- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks -- Using Convolutional Neural Networks for Classifying Malicious Network Traffic -- DBD: Deep Learning DGA-based Botnet Detection -- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks -- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach -- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks -- Forensic Detection of Child Exploitation Material using Deep Learning -- Toward Detection of Child Exploitation Material: A Forensic Approach.
520
$a
Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points. .
650
0
$a
Big data.
$3
981821
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Neural networks (Computer science) .
$3
1253765
650
0
$a
Computer security.
$3
557122
650
0
$a
System safety.
$3
639363
650
1 4
$a
Big Data.
$3
1017136
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Mathematical Models of Cognitive Processes and Neural Networks.
$3
884110
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Security Science and Technology.
$3
783419
700
1
$a
Alazab, Mamoun.
$e
editor.
$1
https://orcid.org/0000-0002-1928-3704
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1309526
700
1
$a
Tang, MingJian.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1309527
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030130565
776
0 8
$i
Printed edition:
$z
9783030130589
776
0 8
$i
Printed edition:
$z
9783030130596
830
0
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
$3
1266773
856
4 0
$u
https://doi.org/10.1007/978-3-030-13057-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login