Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Network intrusion detection using de...
~
Aminanto, Muhamad Erza.
Network intrusion detection using deep learninga feature learning approach /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Network intrusion detection using deep learningby Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja.
Reminder of title:
a feature learning approach /
Author:
Kim, Kwangjo.
other author:
Aminanto, Muhamad Erza.
Published:
Singapore :Springer Singapore :2018.
Description:
xvii, 79 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Machine learning.
Online resource:
https://doi.org/10.1007/978-981-13-1444-5
ISBN:
9789811314445$q(electronic bk.)
Network intrusion detection using deep learninga feature learning approach /
Kim, Kwangjo.
Network intrusion detection using deep learning
a feature learning approach /[electronic resource] :by Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja. - Singapore :Springer Singapore :2018. - xvii, 79 p. :ill., digital ;24 cm. - SpringerBriefs on cyber security systems and networks,2522-5561. - SpringerBriefs on cyber security systems and networks..
Chapter 1 Introduction -- Chapter 2 Intrusion Detection Systems -- Chapter 3 Classical Machine Learning and Its Applications to IDS -- Chapter 4 Deep Learning -- Chapter 5 Deep Learning-based IDSs -- Chapter 6 Deep Feature Learning -- Chapter 7 Summary and Further Challenges.
This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book. Offering a comprehensive overview of deep learning-based IDS, the book is a valuable reerence resource for undergraduate and graduate students, as well as researchers and practitioners interested in deep learning and intrusion detection. Further, the comparison of various deep-learning applications helps readers gain a basic understanding of machine learning, and inspires applications in IDS and other related areas in cybersecurity.
ISBN: 9789811314445$q(electronic bk.)
Standard No.: 10.1007/978-981-13-1444-5doiSubjects--Topical Terms:
188639
Machine learning.
LC Class. No.: Q325.5
Dewey Class. No.: 006.31
Network intrusion detection using deep learninga feature learning approach /
LDR
:02488nmm a2200337 a 4500
001
544486
003
DE-He213
005
20180926142314.0
006
m d
007
cr nn 008maaau
008
190508s2018 si s 0 eng d
020
$a
9789811314445$q(electronic bk.)
020
$a
9789811314438$q(paper)
024
7
$a
10.1007/978-981-13-1444-5
$2
doi
035
$a
978-981-13-1444-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q325.5
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
006.31
$2
23
090
$a
Q325.5
$b
.K49 2018
100
1
$a
Kim, Kwangjo.
$3
468784
245
1 0
$a
Network intrusion detection using deep learning
$h
[electronic resource] :
$b
a feature learning approach /
$c
by Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2018.
300
$a
xvii, 79 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
SpringerBriefs on cyber security systems and networks,
$x
2522-5561
505
0
$a
Chapter 1 Introduction -- Chapter 2 Intrusion Detection Systems -- Chapter 3 Classical Machine Learning and Its Applications to IDS -- Chapter 4 Deep Learning -- Chapter 5 Deep Learning-based IDSs -- Chapter 6 Deep Feature Learning -- Chapter 7 Summary and Further Challenges.
520
$a
This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book. Offering a comprehensive overview of deep learning-based IDS, the book is a valuable reerence resource for undergraduate and graduate students, as well as researchers and practitioners interested in deep learning and intrusion detection. Further, the comparison of various deep-learning applications helps readers gain a basic understanding of machine learning, and inspires applications in IDS and other related areas in cybersecurity.
650
0
$a
Machine learning.
$3
188639
650
0
$a
Data mining.
$3
184440
650
0
$a
Computer security.
$3
184416
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
252959
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Wireless and Mobile Communication.
$3
820685
650
2 4
$a
Big Data.
$3
760530
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
275288
700
1
$a
Aminanto, Muhamad Erza.
$3
823049
700
1
$a
Tanuwidjaja, Harry Chandra.
$3
823050
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
SpringerBriefs on cyber security systems and networks.
$3
814707
856
4 0
$u
https://doi.org/10.1007/978-981-13-1444-5
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000161930
電子館藏
1圖書
電子書
EB Q325.5 .K49 2018 2018
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-981-13-1444-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login