Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Machine learning approaches in cyber...
~
Emmanuel, Sabu.
Machine learning approaches in cyber security analytics
Record Type:
Electronic resources : Monograph/item
Title/Author:
Machine learning approaches in cyber security analyticsby Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel.
Author:
Thomas, Tony.
other author:
P. Vijayaraghavan, Athira.
Published:
Singapore :Springer Singapore :2020.
Description:
xi, 209 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer security.
Online resource:
https://doi.org/10.1007/978-981-15-1706-8
ISBN:
9789811517068$q(electronic bk.)
Machine learning approaches in cyber security analytics
Thomas, Tony.
Machine learning approaches in cyber security analytics
[electronic resource] /by Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel. - Singapore :Springer Singapore :2020. - xi, 209 p. :ill., digital ;24 cm.
Chapter 1. Introduction -- Chapter 2. Machine Learning Algorithms -- Chapter 3. Machine Learning in Cyber Security Analytics -- Chapter 4. Applications of Support Vector Machines -- Chapter 5. Applications of Nearest Neighbor -- Chapter 6. Applications of Clustering -- Chapter 7. Applications of Dimensionality Reduction -- Chapter 8. Applications of other Machine Learning Methods.
This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks.
ISBN: 9789811517068$q(electronic bk.)
Standard No.: 10.1007/978-981-15-1706-8doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25 / T46 2020
Dewey Class. No.: 005.8
Machine learning approaches in cyber security analytics
LDR
:02002nmm a2200337 a 4500
001
575535
003
DE-He213
005
20191220130904.0
006
m d
007
cr nn 008maaau
008
201027s2020 si s 0 eng d
020
$a
9789811517068$q(electronic bk.)
020
$a
9789811517051$q(paper)
024
7
$a
10.1007/978-981-15-1706-8
$2
doi
035
$a
978-981-15-1706-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
T46 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
T462 2020
100
1
$a
Thomas, Tony.
$3
863610
245
1 0
$a
Machine learning approaches in cyber security analytics
$h
[electronic resource] /
$c
by Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
xi, 209 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1. Introduction -- Chapter 2. Machine Learning Algorithms -- Chapter 3. Machine Learning in Cyber Security Analytics -- Chapter 4. Applications of Support Vector Machines -- Chapter 5. Applications of Nearest Neighbor -- Chapter 6. Applications of Clustering -- Chapter 7. Applications of Dimensionality Reduction -- Chapter 8. Applications of other Machine Learning Methods.
520
$a
This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks.
650
0
$a
Computer security.
$3
184416
650
0
$a
Machine learning.
$3
188639
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Cybercrime.
$3
748274
650
2 4
$a
Data Structures.
$3
273992
700
1
$a
P. Vijayaraghavan, Athira.
$3
863611
700
1
$a
Emmanuel, Sabu.
$3
863612
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-981-15-1706-8
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000181491
電子館藏
1圖書
電子書
EB QA76.9.A25 T462 2020 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-981-15-1706-8
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login