Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Handbook of research on machine and ...
~
Ganapathi, Padmavathi, (1964-)
Linked to FindBook
Google Book
Amazon
博客來
Handbook of research on machine and deep learning applications for cyber security
Record Type:
Electronic resources : Monograph/item
Title/Author:
Handbook of research on machine and deep learning applications for cyber security/ Padmavathi Ganapathi and D. Shanmugapriya, editors.
other author:
Ganapathi, Padmavathi,
Published:
Hershey, Pennsylvania :IGI Global, : 2020.,
Description:
1 online resource (482 p.)
[NT 15003449]:
Chapter 1. Review on intelligent algorithms for cyber security -- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms -- Chapter 3. Review on machine and deep learning applications for cyber security -- Chapter 4. Applications of machine learning in cyber security domain -- Chapter 5. Applications of machine learning in cyber security -- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods -- Chapter 7. Cyber threats detection and mitigation using machine learning -- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system -- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning -- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments -- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN) -- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder -- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing -- Chapter 14. Big data analytics for intrusion detection: an overview -- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic -- Chapter 16. A secure protocol for high-dimensional big data providing data privacy -- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment -- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS -- Chapter 19. Variable selection method for regression models using computational intelligence techniques.
Subject:
Computer networks - Security measures. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9611-0
ISBN:
9781522596134 (ebk.)
Handbook of research on machine and deep learning applications for cyber security
Handbook of research on machine and deep learning applications for cyber security
[electronic resource] /Padmavathi Ganapathi and D. Shanmugapriya, editors. - Hershey, Pennsylvania :IGI Global,2020. - 1 online resource (482 p.)
Includes bibliographical references and index.
Chapter 1. Review on intelligent algorithms for cyber security -- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms -- Chapter 3. Review on machine and deep learning applications for cyber security -- Chapter 4. Applications of machine learning in cyber security domain -- Chapter 5. Applications of machine learning in cyber security -- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods -- Chapter 7. Cyber threats detection and mitigation using machine learning -- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system -- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning -- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments -- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN) -- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder -- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing -- Chapter 14. Big data analytics for intrusion detection: an overview -- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic -- Chapter 16. A secure protocol for high-dimensional big data providing data privacy -- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment -- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS -- Chapter 19. Variable selection method for regression models using computational intelligence techniques.
"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--
ISBN: 9781522596134 (ebk.)Subjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .H35325 2020e
Dewey Class. No.: 006.3/1
Handbook of research on machine and deep learning applications for cyber security
LDR
:02896nmm a2200265 a 4500
001
2246881
003
IGIG
005
20211015165746.0
006
m o d
007
cr cn
008
211227s2020 pau fob 001 0 eng d
020
$a
9781522596134 (ebk.)
020
$a
9781522596110 (hnk.)
020
$a
9781522596127 (pbk.)
035
$a
(OCoLC)1112161788
035
$a
1101012237
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5105.59
$b
.H35325 2020e
082
0 0
$a
006.3/1
$2
23
245
0 0
$a
Handbook of research on machine and deep learning applications for cyber security
$h
[electronic resource] /
$c
Padmavathi Ganapathi and D. Shanmugapriya, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2020.
300
$a
1 online resource (482 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Review on intelligent algorithms for cyber security -- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms -- Chapter 3. Review on machine and deep learning applications for cyber security -- Chapter 4. Applications of machine learning in cyber security domain -- Chapter 5. Applications of machine learning in cyber security -- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods -- Chapter 7. Cyber threats detection and mitigation using machine learning -- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system -- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning -- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments -- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN) -- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder -- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing -- Chapter 14. Big data analytics for intrusion detection: an overview -- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic -- Chapter 16. A secure protocol for high-dimensional big data providing data privacy -- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment -- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS -- Chapter 19. Variable selection method for regression models using computational intelligence techniques.
520
3
$a
"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--
$c
Provided by publisher.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Computer security
$x
Data processing.
$3
3395890
650
0
$a
Computer crimes
$x
Prevention
$x
Data processing.
$3
3510655
650
0
$a
Machine learning.
$3
533906
700
1
$a
Ganapathi, Padmavathi,
$d
1964-
$3
3510653
700
1
$a
Shanmugapriya, D.,
$d
1978-
$3
3510654
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9611-0
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9407252
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .H35325 2020e
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login