Symmetry-Adapted Machine Learning for Information Security

Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical dat...

Full description

Saved in:
Bibliographic Details
Sonstige:
Year of Publication:2020
Language:English
Physical Description:1 electronic resource (202 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993546081704498
ctrlnum (CKB)5400000000041002
(oapen)https://directory.doabooks.org/handle/20.500.12854/68858
(EXLCZ)995400000000041002
collection bib_alma
record_format marc
spelling Park, James edt
Symmetry-Adapted Machine Learning for Information Security
Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2020
1 electronic resource (202 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis.
English
History of engineering & technology bicssc
3-03936-642-4
3-03936-643-2
Park, James oth
language English
format eBook
author2 Park, James
author_facet Park, James
author2_variant j p jp
author2_role Sonstige
title Symmetry-Adapted Machine Learning for Information Security
spellingShingle Symmetry-Adapted Machine Learning for Information Security
title_full Symmetry-Adapted Machine Learning for Information Security
title_fullStr Symmetry-Adapted Machine Learning for Information Security
title_full_unstemmed Symmetry-Adapted Machine Learning for Information Security
title_auth Symmetry-Adapted Machine Learning for Information Security
title_new Symmetry-Adapted Machine Learning for Information Security
title_sort symmetry-adapted machine learning for information security
publisher MDPI - Multidisciplinary Digital Publishing Institute
publishDate 2020
physical 1 electronic resource (202 p.)
isbn 3-03936-642-4
3-03936-643-2
illustrated Not Illustrated
work_keys_str_mv AT parkjames symmetryadaptedmachinelearningforinformationsecurity
status_str n
ids_txt_mv (CKB)5400000000041002
(oapen)https://directory.doabooks.org/handle/20.500.12854/68858
(EXLCZ)995400000000041002
carrierType_str_mv cr
is_hierarchy_title Symmetry-Adapted Machine Learning for Information Security
author2_original_writing_str_mv noLinkedField
_version_ 1787548708912496640
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02199nam-a2200289z--4500</leader><controlfield tag="001">993546081704498</controlfield><controlfield tag="005">20231214133652.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202105s2020 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000041002</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/68858</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000041002</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Park, James</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Symmetry-Adapted Machine Learning for Information Security</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel, Switzerland</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (202 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">History of engineering &amp; technology</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-03936-642-4</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-03936-643-2</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Park, James</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 06:01:57 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338107100004498&amp;Force_direct=true</subfield><subfield code="Z">5338107100004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338107100004498</subfield></datafield></record></collection>