語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Machine Learning Approaches in Cyber...
~
Thomas, Tony.
Machine Learning Approaches in Cyber Security Analytics
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Machine Learning Approaches in Cyber Security Analytics/ by Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel.
作者:
Thomas, Tony.
其他作者:
Emmanuel, Sabu.
面頁冊數:
XI, 209 p. 76 illus., 43 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data Structures. -
電子資源:
https://doi.org/10.1007/978-981-15-1706-8
ISBN:
9789811517068
Machine Learning Approaches in Cyber Security Analytics
Thomas, Tony.
Machine Learning Approaches in Cyber Security Analytics
[electronic resource] /by Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel. - 1st ed. 2020. - XI, 209 p. 76 illus., 43 illus. in color.online resource.
Chapter 1. Introduction -- Chapter 2. Machine Learning Algorithms -- Chapter 3. Machine Learning in Cyber Security Analytics -- Chapter 4. Applications of Support Vector Machines -- Chapter 5. Applications of Nearest Neighbor -- Chapter 6. Applications of Clustering -- Chapter 7. Applications of Dimensionality Reduction -- Chapter 8. Applications of other Machine Learning Methods.
This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks. .
ISBN: 9789811517068
Standard No.: 10.1007/978-981-15-1706-8doiSubjects--Topical Terms:
669824
Data Structures.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Machine Learning Approaches in Cyber Security Analytics
LDR
:02368nam a22004095i 4500
001
1018323
003
DE-He213
005
20200704111206.0
007
cr nn 008mamaa
008
210318s2020 si | s |||| 0|eng d
020
$a
9789811517068
$9
978-981-15-1706-8
024
7
$a
10.1007/978-981-15-1706-8
$2
doi
035
$a
978-981-15-1706-8
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Thomas, Tony.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1313283
245
1 0
$a
Machine Learning Approaches in Cyber Security Analytics
$h
[electronic resource] /
$c
by Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel.
250
$a
1st ed. 2020.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
XI, 209 p. 76 illus., 43 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1. Introduction -- Chapter 2. Machine Learning Algorithms -- Chapter 3. Machine Learning in Cyber Security Analytics -- Chapter 4. Applications of Support Vector Machines -- Chapter 5. Applications of Nearest Neighbor -- Chapter 6. Applications of Clustering -- Chapter 7. Applications of Dimensionality Reduction -- Chapter 8. Applications of other Machine Learning Methods.
520
$a
This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks. .
650
2 4
$a
Data Structures.
$3
669824
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Application software.
$3
528147
650
0
$a
Computer security.
$3
557122
700
1
$a
Emmanuel, Sabu.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1313285
700
1
$a
P. Vijayaraghavan, Athira.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1313284
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811517051
776
0 8
$i
Printed edition:
$z
9789811517075
776
0 8
$i
Printed edition:
$z
9789811517082
856
4 0
$u
https://doi.org/10.1007/978-981-15-1706-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入