語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Deployable Machine Learning for Secu...
~
SpringerLink (Online service)
Deployable Machine Learning for Security Defense = First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Deployable Machine Learning for Security Defense/ edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh.
其他題名:
First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings /
其他作者:
Ahmadzadeh, Ali.
面頁冊數:
VII, 165 p. 170 illus., 45 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Information Systems Applications (incl. Internet). -
電子資源:
https://doi.org/10.1007/978-3-030-59621-7
ISBN:
9783030596217
Deployable Machine Learning for Security Defense = First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings /
Deployable Machine Learning for Security Defense
First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings /[electronic resource] :edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh. - 1st ed. 2020. - VII, 165 p. 170 illus., 45 illus. in color.online resource. - Communications in Computer and Information Science,12711865-0929 ;. - Communications in Computer and Information Science,498.
Understanding the Adversaries -- Adversarial ML for Better Security -- Threats on Networks.
This book constitutes selected papers from the First International Workshop on Deployable Machine Learning for Security Defense, MLHat 2020, held in August 2020. Due to the COVID-19 pandemic the conference was held online. The 8 full papers were thoroughly reviewed and selected from 13 qualified submissions. The papers are organized in the following topical sections: understanding the adversaries; adversarial ML for better security; threats on networks.
ISBN: 9783030596217
Standard No.: 10.1007/978-3-030-59621-7doiSubjects--Topical Terms:
881699
Information Systems Applications (incl. Internet).
LC Class. No.: QA75.5-76.95
Dewey Class. No.: 004
Deployable Machine Learning for Security Defense = First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings /
LDR
:02054nam a22003975i 4500
001
1030580
003
DE-He213
005
20201017192851.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030596217
$9
978-3-030-59621-7
024
7
$a
10.1007/978-3-030-59621-7
$2
doi
035
$a
978-3-030-59621-7
050
4
$a
QA75.5-76.95
072
7
$a
UB
$2
bicssc
072
7
$a
COM079010
$2
bisacsh
072
7
$a
UB
$2
thema
082
0 4
$a
004
$2
23
245
1 0
$a
Deployable Machine Learning for Security Defense
$h
[electronic resource] :
$b
First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings /
$c
edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
VII, 165 p. 170 illus., 45 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
1271
505
0
$a
Understanding the Adversaries -- Adversarial ML for Better Security -- Threats on Networks.
520
$a
This book constitutes selected papers from the First International Workshop on Deployable Machine Learning for Security Defense, MLHat 2020, held in August 2020. Due to the COVID-19 pandemic the conference was held online. The 8 full papers were thoroughly reviewed and selected from 13 qualified submissions. The papers are organized in the following topical sections: understanding the adversaries; adversarial ML for better security; threats on networks.
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Computer Crime.
$3
1226852
650
2 4
$a
Systems and Data Security.
$3
677062
650
1 4
$a
Computing Milieux.
$3
669921
650
0
$a
Application software.
$3
528147
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Computer security.
$3
557122
650
0
$a
Computers.
$3
565115
700
1
$a
Ahmadzadeh, Ali.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1327522
700
1
$a
Ciptadi, Arridhana.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1327521
700
1
$a
Wang, Gang.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
636429
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030596200
776
0 8
$i
Printed edition:
$z
9783030596224
830
0
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
498
$3
1253583
856
4 0
$u
https://doi.org/10.1007/978-3-030-59621-7
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入