Handbook of research on machine and deep learning applications for cyber security

"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--

Bibliographic Details
Other Authors: Ganapathi, Padmavathi, 1964-, Shanmugapriya, D., 1978-
Format: eBook
Language:English
Published: Hershey, PA IGI Global, [2020]
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 03831cam a2200493Ki 4500
001 koha001013219
003 OCoLC
005 20250222065953.0
006 m e d
007 cr bn||||m|||a
008 190813s2020 pau fob 001 0 eng d
035 |a koha001013219 
040 |a IGIGL  |b eng  |e rda  |c IGIGL  |d OCLCO  |d YDXIT  |d N$T 
020 |a 1522596135  |q electronic book 
020 |a 9781522596141  |q electronic book 
020 |a 1522596143  |q electronic book 
020 |a 9781522596134  |q (electronic bk.) 
020 |z 9781522596110  |q h/c 
020 |z 9781522596127  |q s/c 
024 7 |a 10.4018/978-1-5225-9611-0  |2 doi 
050 4 |a TK5105.59  |b .H325 2020 
082 0 4 |a 006.3/1  |2 23 
049 |a MAIN 
245 0 0 |a Handbook of research on machine and deep learning applications for cyber security  |c Padmavathi Ganapathi and D. Shanmugapriya, editors. 
264 1 |a Hershey, PA  |b IGI Global,  |c [2020] 
300 |a 1 online resource (482 pages) 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1. Review on intelligent algorithms for cyber security -- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms -- Chapter 3. Review on machine and deep learning applications for cyber security -- Chapter 4. Applications of machine learning in cyber security domain -- Chapter 5. Applications of machine learning in cyber security -- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods -- Chapter 7. Cyber threats detection and mitigation using machine learning -- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system -- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning -- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments -- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN) -- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder -- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing -- Chapter 14. Big data analytics for intrusion detection: an overview -- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic -- Chapter 16. A secure protocol for high-dimensional big data providing data privacy -- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment -- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS -- Chapter 19. Variable selection method for regression models using computational intelligence techniques. 
520 3 |a "This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--  |c Provided by publisher. 
588 |a Description based on online resource; title from digital title page (viewed on September 03, 2019). 
653 0 |a Computer networks  |x Security measures. 
653 0 |a Computer security  |x Data processing. 
653 0 |a Computer crimes  |x Prevention  |x Data processing. 
653 0 |a Machine learning. 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
700 1 |a Ganapathi, Padmavathi,  |d 1964-  |9 911201 
700 1 |a Shanmugapriya, D.,  |d 1978-  |9 911202 
710 2 |a IGI Global,  |e publisher.  |9 899844 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/2227914.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013219 
910 |a EBSCO eBooks 
999 |c 1013219  |d 1013219 
039