Applications of machine learning and deep learning for privacy and cybersecurity

"This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations&q...

Full description

Bibliographic Details
Other Authors: Lobo, Victor, 1965-, Correia, Anacleto, 1961-
Format: eBook
Language:English
Published: Hershey, PA Information Science Reference, an imprint of IGI Global, [2022]
Series:Advances in information security, privacy, and ethics (AISPE) book series.
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 03485cam a2200541 i 4500
001 koha001013791
003 OCoLC
005 20250222070012.0
006 m d
007 cr cnu---unuuu
008 211104s2022 paua ob 001 0 eng
010 |a  2021052895 
035 |a koha001013791 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCF  |d IGIGL  |d YDX  |d N$T 
019 |a 1288424541 
020 |a 9781799894322  |q electronic book 
020 |a 1799894320  |q electronic book 
020 |a 9781799894339  |q (electronic bk.) 
020 |a 1799894339  |q (electronic bk.) 
020 |z 9781799894308  |q hardcover 
020 |z 9781799894315  |q paperback 
042 |a pcc 
050 0 4 |a TK5105.59  |b .A67 2022 
082 0 0 |a 005.8  |2 23/eng/20211207 
049 |a MAIN 
245 0 0 |a Applications of machine learning and deep learning for privacy and cybersecurity  |c Victor Lobo, Anacleto Correia. 
264 1 |a Hershey, PA  |b Information Science Reference, an imprint of IGI Global,  |c [2022] 
300 |a 1 online resource (xxi, 271 pages)  |b illustrations (chiefly color). 
490 1 |a Advances in information security, privacy, and ethics (AISPE) book series 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1. User profiling using keystroke dynamics and rotation forest -- Chapter 2. Predictive modelling for financial fraud detection using data analytics: a gradient-boosting decision tree -- Chapter 3. Comprehensive overview of autonomous vehicles and their security against DDoS attacks -- Chapter 4. Application of machine learning to user behavior-based authentication in smartphone and web -- Chapter 5. The role of deception in securing our cyberspace: honeypots are a viable option -- Chapter 6. Holistic view on detecting DDoS attacks using machine learning -- Chapter 7. Masked transient effect ring oscillator physical unclonable function against machine learning attacks -- Chapter 8. Detecting bank financial fraud in South Africa using a logistic model tree -- Chapter 9. Innovative legitimate non-traditional doctorate programs in cybersecurity, engineering, and technology -- Chapter 10. Privacy preservation of image data with machine learning. 
520 |a "This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations"--  |c Provided by publisher. 
588 |a Description based on online resource; title from digital title page (viewed on October 04, 2022). 
653 0 |a Computer networks  |x Security measures  |x Data processing. 
653 0 |a Computer security. 
653 0 |a Deep learning (Machine learning) 
653 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
653 7 |a Deep learning (Machine learning)  |2 fast  |0 (OCoLC)fst02032663 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
700 1 |a Lobo, Victor,  |d 1965-  |9 912526 
700 1 |a Correia, Anacleto,  |d 1961-  |9 912527 
830 0 |a Advances in information security, privacy, and ethics (AISPE) book series.  |9 911200 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/3380199.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013791 
910 |a EBSCO eBooks 
999 |c 1013791  |d 1013791 
039