Handbook of research on machine and deep learning applications for cyber security
"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--
| Other Authors: | , |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Hershey, PA
IGI Global,
[2020]
|
| Subjects: | |
| Online Access: | EBSCOhost Перейти в каталог НБ ТГУ |
| LEADER | 03831cam a2200493Ki 4500 | ||
|---|---|---|---|
| 001 | koha001013219 | ||
| 003 | OCoLC | ||
| 005 | 20250222065953.0 | ||
| 006 | m e d | ||
| 007 | cr bn||||m|||a | ||
| 008 | 190813s2020 pau fob 001 0 eng d | ||
| 035 | |a koha001013219 | ||
| 040 | |a IGIGL |b eng |e rda |c IGIGL |d OCLCO |d YDXIT |d N$T | ||
| 020 | |a 1522596135 |q electronic book | ||
| 020 | |a 9781522596141 |q electronic book | ||
| 020 | |a 1522596143 |q electronic book | ||
| 020 | |a 9781522596134 |q (electronic bk.) | ||
| 020 | |z 9781522596110 |q h/c | ||
| 020 | |z 9781522596127 |q s/c | ||
| 024 | 7 | |a 10.4018/978-1-5225-9611-0 |2 doi | |
| 050 | 4 | |a TK5105.59 |b .H325 2020 | |
| 082 | 0 | 4 | |a 006.3/1 |2 23 |
| 049 | |a MAIN | ||
| 245 | 0 | 0 | |a Handbook of research on machine and deep learning applications for cyber security |c Padmavathi Ganapathi and D. Shanmugapriya, editors. |
| 264 | 1 | |a Hershey, PA |b IGI Global, |c [2020] | |
| 300 | |a 1 online resource (482 pages) | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Chapter 1. Review on intelligent algorithms for cyber security -- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms -- Chapter 3. Review on machine and deep learning applications for cyber security -- Chapter 4. Applications of machine learning in cyber security domain -- Chapter 5. Applications of machine learning in cyber security -- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods -- Chapter 7. Cyber threats detection and mitigation using machine learning -- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system -- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning -- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments -- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN) -- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder -- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing -- Chapter 14. Big data analytics for intrusion detection: an overview -- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic -- Chapter 16. A secure protocol for high-dimensional big data providing data privacy -- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment -- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS -- Chapter 19. Variable selection method for regression models using computational intelligence techniques. | |
| 520 | 3 | |a "This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"-- |c Provided by publisher. | |
| 588 | |a Description based on online resource; title from digital title page (viewed on September 03, 2019). | ||
| 653 | 0 | |a Computer networks |x Security measures. | |
| 653 | 0 | |a Computer security |x Data processing. | |
| 653 | 0 | |a Computer crimes |x Prevention |x Data processing. | |
| 653 | 0 | |a Machine learning. | |
| 655 | 0 | |a EBSCO eBooks |9 905790 | |
| 655 | 4 | |a Electronic books. |9 899821 | |
| 700 | 1 | |a Ganapathi, Padmavathi, |d 1964- |9 911201 | |
| 700 | 1 | |a Shanmugapriya, D., |d 1978- |9 911202 | |
| 710 | 2 | |a IGI Global, |e publisher. |9 899844 | |
| 856 | 4 | 0 | |3 EBSCOhost |u https://www.lib.tsu.ru/limit/2023/EBSCO/2227914.pdf |
| 856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013219 | ||
| 910 | |a EBSCO eBooks | ||
| 999 | |c 1013219 |d 1013219 | ||
| 039 | |||
