語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Handbook of research on machine and ...
~
Ganapathi, Padmavathi, (1964-)
Handbook of research on machine and deep learning applications for cyber security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Handbook of research on machine and deep learning applications for cyber security/ Padmavathi Ganapathi and D. Shanmugapriya, editors.
其他作者:
Shanmugapriya, D.,
出版者:
Hershey, Pennsylvania :IGI Global, : 2020.,
面頁冊數:
1 online resource (482 p.)
標題:
Machine learning. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9611-0
ISBN:
9781522596134 (ebk.)
Handbook of research on machine and deep learning applications for cyber security
Handbook of research on machine and deep learning applications for cyber security
[electronic resource] /Padmavathi Ganapathi and D. Shanmugapriya, editors. - Hershey, Pennsylvania :IGI Global,2020. - 1 online resource (482 p.)
Includes bibliographical references and index.
Chapter 1. Review on intelligent algorithms for cyber security -- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms -- Chapter 3. Review on machine and deep learning applications for cyber security -- Chapter 4. Applications of machine learning in cyber security domain -- Chapter 5. Applications of machine learning in cyber security -- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods -- Chapter 7. Cyber threats detection and mitigation using machine learning -- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system -- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning -- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments -- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN) -- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder -- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing -- Chapter 14. Big data analytics for intrusion detection: an overview -- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic -- Chapter 16. A secure protocol for high-dimensional big data providing data privacy -- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment -- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS -- Chapter 19. Variable selection method for regression models using computational intelligence techniques.
"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--
ISBN: 9781522596134 (ebk.)Subjects--Topical Terms:
561253
Machine learning.
LC Class. No.: TK5105.59 / .H35325 2020e
Dewey Class. No.: 006.3/1
Handbook of research on machine and deep learning applications for cyber security
LDR
:02896nam a2200265 a 4500
001
1041366
003
IGIG
005
20211015165746.0
006
m o d
007
cr cn
008
211215s2020 pau fob 001 0 eng d
020
$a
9781522596134 (ebk.)
020
$a
9781522596110 (hnk.)
020
$a
9781522596127 (pbk.)
035
$a
(OCoLC)1112161788
035
$a
1101012237
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5105.59
$b
.H35325 2020e
082
0 0
$a
006.3/1
$2
23
245
0 0
$a
Handbook of research on machine and deep learning applications for cyber security
$h
[electronic resource] /
$c
Padmavathi Ganapathi and D. Shanmugapriya, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2020.
300
$a
1 online resource (482 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Review on intelligent algorithms for cyber security -- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms -- Chapter 3. Review on machine and deep learning applications for cyber security -- Chapter 4. Applications of machine learning in cyber security domain -- Chapter 5. Applications of machine learning in cyber security -- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods -- Chapter 7. Cyber threats detection and mitigation using machine learning -- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system -- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning -- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments -- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN) -- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder -- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing -- Chapter 14. Big data analytics for intrusion detection: an overview -- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic -- Chapter 16. A secure protocol for high-dimensional big data providing data privacy -- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment -- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS -- Chapter 19. Variable selection method for regression models using computational intelligence techniques.
520
3
$a
"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--
$c
Provided by publisher.
650
0
$a
Machine learning.
$3
561253
650
0
$a
Computer crimes
$x
Prevention
$x
Data processing.
$3
1340814
650
0
$a
Computer security
$x
Data processing.
$3
1235103
650
0
$a
Computer networks
$x
Security measures.
$3
555385
700
1
$a
Shanmugapriya, D.,
$d
1978-
$3
1340813
700
1
$a
Ganapathi, Padmavathi,
$d
1964-
$3
1340812
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9611-0
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入