紀錄類型: |
書目-電子資源
: Monograph/item
|
杜威分類號: |
006.3/1 |
書名/作者: |
Handbook of research on machine and deep learning applications for cyber security/ Padmavathi Ganapathi and D. Shanmugapriya, editors. |
其他作者: |
Ganapathi, Padmavathi, |
出版者: |
Hershey, Pennsylvania : : IGI Global,, 2020. |
面頁冊數: |
1 online resource (482 p.) |
標題: |
Computer networks - Security measures. |
標題: |
Computer security - Data processing. |
標題: |
Computer crimes - Prevention |
標題: |
Machine learning. |
ISBN: |
9781522596134 (ebk.) |
ISBN: |
9781522596110 (hnk.) |
ISBN: |
9781522596127 (pbk.) |
書目註: |
Includes bibliographical references and index. |
內容註: |
Chapter 1. Review on intelligent algorithms for cyber security -- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms -- Chapter 3. Review on machine and deep learning applications for cyber security -- Chapter 4. Applications of machine learning in cyber security domain -- Chapter 5. Applications of machine learning in cyber security -- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods -- Chapter 7. Cyber threats detection and mitigation using machine learning -- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system -- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning -- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments -- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN) -- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder -- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing -- Chapter 14. Big data analytics for intrusion detection: an overview -- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic -- Chapter 16. A secure protocol for high-dimensional big data providing data privacy -- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment -- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS -- Chapter 19. Variable selection method for regression models using computational intelligence techniques. |
摘要、提要註: |
"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"-- |
電子資源: |
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9611-0 |