Symmetry-Adapted Machine Learning for Information Security
Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical dat...
Saved in:
Sonstige: | |
---|---|
Year of Publication: | 2020 |
Language: | English |
Physical Description: | 1 electronic resource (202 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993546081704498 |
---|---|
ctrlnum |
(CKB)5400000000041002 (oapen)https://directory.doabooks.org/handle/20.500.12854/68858 (EXLCZ)995400000000041002 |
collection |
bib_alma |
record_format |
marc |
spelling |
Park, James edt Symmetry-Adapted Machine Learning for Information Security Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2020 1 electronic resource (202 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis. English History of engineering & technology bicssc 3-03936-642-4 3-03936-643-2 Park, James oth |
language |
English |
format |
eBook |
author2 |
Park, James |
author_facet |
Park, James |
author2_variant |
j p jp |
author2_role |
Sonstige |
title |
Symmetry-Adapted Machine Learning for Information Security |
spellingShingle |
Symmetry-Adapted Machine Learning for Information Security |
title_full |
Symmetry-Adapted Machine Learning for Information Security |
title_fullStr |
Symmetry-Adapted Machine Learning for Information Security |
title_full_unstemmed |
Symmetry-Adapted Machine Learning for Information Security |
title_auth |
Symmetry-Adapted Machine Learning for Information Security |
title_new |
Symmetry-Adapted Machine Learning for Information Security |
title_sort |
symmetry-adapted machine learning for information security |
publisher |
MDPI - Multidisciplinary Digital Publishing Institute |
publishDate |
2020 |
physical |
1 electronic resource (202 p.) |
isbn |
3-03936-642-4 3-03936-643-2 |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT parkjames symmetryadaptedmachinelearningforinformationsecurity |
status_str |
n |
ids_txt_mv |
(CKB)5400000000041002 (oapen)https://directory.doabooks.org/handle/20.500.12854/68858 (EXLCZ)995400000000041002 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Symmetry-Adapted Machine Learning for Information Security |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1787548708912496640 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02199nam-a2200289z--4500</leader><controlfield tag="001">993546081704498</controlfield><controlfield tag="005">20231214133652.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202105s2020 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000041002</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/68858</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000041002</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Park, James</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Symmetry-Adapted Machine Learning for Information Security</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel, Switzerland</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (202 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">History of engineering & technology</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-03936-642-4</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-03936-643-2</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Park, James</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 06:01:57 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338107100004498&Force_direct=true</subfield><subfield code="Z">5338107100004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338107100004498</subfield></datafield></record></collection> |