語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Machine Intelligence and Big Data An...
~
Baddi, Youssef.
Machine Intelligence and Big Data Analytics for Cybersecurity Applications
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Machine Intelligence and Big Data Analytics for Cybersecurity Applications/ edited by Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi.
其他作者:
Baddi, Youssef.
面頁冊數:
XIII, 539 p. 210 illus., 172 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Machine Learning. -
電子資源:
https://doi.org/10.1007/978-3-030-57024-8
ISBN:
9783030570248
Machine Intelligence and Big Data Analytics for Cybersecurity Applications
Machine Intelligence and Big Data Analytics for Cybersecurity Applications
[electronic resource] /edited by Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi. - 1st ed. 2021. - XIII, 539 p. 210 illus., 172 illus. in color.online resource. - Studies in Computational Intelligence,9191860-9503 ;. - Studies in Computational Intelligence,564.
Network Intrusion Detection: Taxonomy and Machine Learning Applications -- Machine Learning and Deep Learning models for Big Data Issues -- The Fundamentals and Potential for Cybersecurity of Big Data in the Modern World -- Improving Cyber-Threat Detection by Moving the Boundary around the Normal Samples -- Bayesian Networks for Online Threat Detection -- Network Intrusion Detection for TCP/IP Packets with Machine Learning Techniques -- Developing a Blockchain-based and Distributed Database-oriented Multi-Malware Detection Engine -- Classifying Common Vulnerabilities and Exposures Database Using Text Mining and Graph Theoretical Analysis -- Robust Cryptographical Applications for a Secure Wireless Network Protocol.
This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks but also because of the large scale and complex nature of today’s IT infrastructures. It discusses novel trends and achievements in machine intelligence and their role in the development of secure systems and identifies open and future research issues related to the application of machine intelligence in the cybersecurity field. Bridging an important gap between machine intelligence, big data, and cybersecurity communities, it aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances on machine intelligence and big data analytics for cybersecurity applications. .
ISBN: 9783030570248
Standard No.: 10.1007/978-3-030-57024-8doiSubjects--Topical Terms:
1137723
Machine Learning.
LC Class. No.: TA345-345.5
Dewey Class. No.: 620.00285
Machine Intelligence and Big Data Analytics for Cybersecurity Applications
LDR
:03388nam a22004215i 4500
001
1050716
003
DE-He213
005
20210921192803.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030570248
$9
978-3-030-57024-8
024
7
$a
10.1007/978-3-030-57024-8
$2
doi
035
$a
978-3-030-57024-8
050
4
$a
TA345-345.5
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
072
7
$a
TB
$2
thema
082
0 4
$a
620.00285
$2
23
245
1 0
$a
Machine Intelligence and Big Data Analytics for Cybersecurity Applications
$h
[electronic resource] /
$c
edited by Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XIII, 539 p. 210 illus., 172 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Studies in Computational Intelligence,
$x
1860-9503 ;
$v
919
505
0
$a
Network Intrusion Detection: Taxonomy and Machine Learning Applications -- Machine Learning and Deep Learning models for Big Data Issues -- The Fundamentals and Potential for Cybersecurity of Big Data in the Modern World -- Improving Cyber-Threat Detection by Moving the Boundary around the Normal Samples -- Bayesian Networks for Online Threat Detection -- Network Intrusion Detection for TCP/IP Packets with Machine Learning Techniques -- Developing a Blockchain-based and Distributed Database-oriented Multi-Malware Detection Engine -- Classifying Common Vulnerabilities and Exposures Database Using Text Mining and Graph Theoretical Analysis -- Robust Cryptographical Applications for a Secure Wireless Network Protocol.
520
$a
This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks but also because of the large scale and complex nature of today’s IT infrastructures. It discusses novel trends and achievements in machine intelligence and their role in the development of secure systems and identifies open and future research issues related to the application of machine intelligence in the cybersecurity field. Bridging an important gap between machine intelligence, big data, and cybersecurity communities, it aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances on machine intelligence and big data analytics for cybersecurity applications. .
650
2 4
$a
Machine Learning.
$3
1137723
650
2 4
$a
Computational Intelligence.
$3
768837
650
1 4
$a
Data Engineering.
$3
1226308
650
0
$a
Machine learning.
$3
561253
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Engineering—Data processing.
$3
1297966
700
1
$a
Baddi, Youssef.
$e
editor.
$1
https://orcid.org/0000-0002-4139-9033
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1349666
700
1
$a
Alazab, Mamoun.
$e
editor.
$1
https://orcid.org/0000-0002-1928-3704
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1309526
700
1
$a
Shojafar, Mohammad.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1090831
700
1
$a
Maleh, Yassine.
$e
editor.
$1
https://orcid.org/0000-0003-4704-5364
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1349665
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030570231
776
0 8
$i
Printed edition:
$z
9783030570255
776
0 8
$i
Printed edition:
$z
9783030570262
830
0
$a
Studies in Computational Intelligence,
$x
1860-949X ;
$v
564
$3
1253640
856
4 0
$u
https://doi.org/10.1007/978-3-030-57024-8
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入