Handbook of research on machine and deep learning applications for cyber security
"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--
| Other Authors: | , |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Hershey, PA
IGI Global,
[2020]
|
| Subjects: | |
| Online Access: | EBSCOhost Перейти в каталог НБ ТГУ |
Table of Contents:
- Chapter 1. Review on intelligent algorithms for cyber security
- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms
- Chapter 3. Review on machine and deep learning applications for cyber security
- Chapter 4. Applications of machine learning in cyber security domain
- Chapter 5. Applications of machine learning in cyber security
- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods
- Chapter 7. Cyber threats detection and mitigation using machine learning
- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system
- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning
- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments
- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN)
- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder
- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing
- Chapter 14. Big data analytics for intrusion detection: an overview
- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic
- Chapter 16. A secure protocol for high-dimensional big data providing data privacy
- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment
- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS
- Chapter 19. Variable selection method for regression models using computational intelligence techniques.
