Machine Learning for Cyber Security / / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram.
This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses to...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 |
---|---|
MitwirkendeR: | |
HerausgeberIn: | |
Place / Publishing House: | Berlin ;, Boston : : De Gruyter, , [2022] ©2023 |
Year of Publication: | 2022 |
Language: | English |
Series: | De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,
15 |
Online Access: | |
Physical Description: | 1 online resource (X, 148 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 06473nam a22010575i 4500 | ||
---|---|---|---|
001 | 9783110766745 | ||
003 | DE-B1597 | ||
005 | 20230529101353.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 230529t20222023gw fo d z eng d | ||
020 | |a 9783110766745 | ||
024 | 7 | |a 10.1515/9783110766745 |2 doi | |
035 | |a (DE-B1597)600260 | ||
035 | |a (OCoLC)1353268744 | ||
040 | |a DE-B1597 |b eng |c DE-B1597 |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
245 | 0 | 0 | |a Machine Learning for Cyber Security / |c ed. by Preeti Malik, Lata Nautiyal, Mangey Ram. |
264 | 1 | |a Berlin ; |a Boston : |b De Gruyter, |c [2022] | |
264 | 4 | |c ©2023 | |
300 | |a 1 online resource (X, 148 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 0 | |a De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , |x 2626-5427 ; |v 15 | |
505 | 0 | 0 | |t Frontmatter -- |t Preface -- |t Contents -- |t List of contributors -- |t Editor’s biography -- |t Differential privacy: a solution to privacy issue in social networks -- |t Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms -- |t The ransomware: an emerging security challenge to the cyberspace -- |t Property-based attestation in device swarms: a machine learning approach -- |t A review of machine learning techniques in cybersecurity and research opportunities -- |t A framework for seborrheic keratosis skin disease identification using Vision Transformer -- |t Mapping AICTE cybersecurity curriculum onto CyBOK: a case study -- |t Index |
506 | 0 | |a restricted access |u http://purl.org/coar/access_right/c_16ec |f online access with authorization |2 star | |
520 | |a This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools. | ||
530 | |a Issued also in print. | ||
538 | |a Mode of access: Internet via World Wide Web. | ||
546 | |a In English. | ||
588 | 0 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Mai 2023) | |
650 | 4 | |a IT-Sicherheit. | |
650 | 4 | |a Künstliche Intelligenz. | |
650 | 4 | |a Maschinelles Lernen. | |
650 | 4 | |a Neuronale Netze. | |
653 | |a Machine Learning, Deep Learning, Neuronal Networks, Cybersecurity, IT-Security. | ||
700 | 1 | |a Aswal, Kiran, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Baliyan, Nikhil, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Dobhal, Dinesh C., |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Goyal, Nupur, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Kamika,, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Kumar Roy, Vikas, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Kumar Singh, Ashwini, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Malik, Preeti, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Malik, Preeti, |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Mittal, Mohit, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Mittal, Sangeeta, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Mittal, Varsha, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Nanath, Krishnadas, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Nautiyal, Lata, |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Nautiyal, Rohit, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Nijhawan, Rahul, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Pathak, Heman, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Rahman, Abdul, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Ram, Mangey, |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Rawat, Swati, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Thakur, Vasu, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Tiwari, Umesh K., |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Wedaj Kibret, Samuel, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t DG Plus DeG Package 2023 Part 1 |z 9783111175782 |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t EBOOK PACKAGE COMPLETE 2022 English |z 9783110993899 |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t EBOOK PACKAGE COMPLETE 2022 |z 9783110994810 |o ZDB-23-DGG |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t EBOOK PACKAGE Engineering, Computer Sciences 2022 English |z 9783110994223 |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t EBOOK PACKAGE Engineering, Computer Sciences 2022 |z 9783110994193 |o ZDB-23-DEI |
776 | 0 | |c EPUB |z 9783110766769 | |
776 | 0 | |c print |z 9783110766738 | |
856 | 4 | 0 | |u https://doi.org/10.1515/9783110766745 |
856 | 4 | 0 | |u https://www.degruyter.com/isbn/9783110766745 |
856 | 4 | 2 | |3 Cover |u https://www.degruyter.com/document/cover/isbn/9783110766745/original |
912 | |a 978-3-11-099389-9 EBOOK PACKAGE COMPLETE 2022 English |b 2022 | ||
912 | |a 978-3-11-099422-3 EBOOK PACKAGE Engineering, Computer Sciences 2022 English |b 2022 | ||
912 | |a 978-3-11-117578-2 DG Plus DeG Package 2023 Part 1 |b 2023 | ||
912 | |a EBA_CL_CHCOMSGSEN | ||
912 | |a EBA_CL_MTPY | ||
912 | |a EBA_DGALL | ||
912 | |a EBA_EBKALL | ||
912 | |a EBA_ECL_CHCOMSGSEN | ||
912 | |a EBA_ECL_MTPY | ||
912 | |a EBA_EEBKALL | ||
912 | |a EBA_ESTMALL | ||
912 | |a EBA_STMALL | ||
912 | |a GBV-deGruyter-alles | ||
912 | |a PDA12STME | ||
912 | |a PDA13ENGE | ||
912 | |a PDA18STMEE | ||
912 | |a PDA5EBK | ||
912 | |a ZDB-23-DEI |b 2022 | ||
912 | |a ZDB-23-DGG |b 2022 |