語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Deep learning applications for cyber...
~
Alazab, Mamoun.
Deep learning applications for cyber security
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Deep learning applications for cyber securityedited by Mamoun Alazab, MingJian Tang.
其他作者:
Alazab, Mamoun.
出版者:
Cham :Springer International Publishing :2019.
面頁冊數:
xx, 246 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer security.
電子資源:
https://doi.org/10.1007/978-3-030-13057-2
ISBN:
9783030130572$q(electronic bk.)
Deep learning applications for cyber security
Deep learning applications for cyber security
[electronic resource] /edited by Mamoun Alazab, MingJian Tang. - Cham :Springer International Publishing :2019. - xx, 246 p. :ill., digital ;24 cm. - Advanced sciences and technologies for security applications,1613-5113. - Advanced sciences and technologies for security applications..
Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft -- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems -- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks -- Using Convolutional Neural Networks for Classifying Malicious Network Traffic -- DBD: Deep Learning DGA-based Botnet Detection -- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks -- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach -- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks -- Forensic Detection of Child Exploitation Material using Deep Learning -- Toward Detection of Child Exploitation Material: A Forensic Approach.
Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points.
ISBN: 9783030130572$q(electronic bk.)
Standard No.: 10.1007/978-3-030-13057-2doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25 / D44 2019
Dewey Class. No.: 005.8
Deep learning applications for cyber security
LDR
:02930nmm a2200337 a 4500
001
586712
003
DE-He213
005
20200704121038.0
006
m d
007
cr nn 008maaau
008
210326s2019 sz s 0 eng d
020
$a
9783030130572$q(electronic bk.)
020
$a
9783030130565$q(paper)
024
7
$a
10.1007/978-3-030-13057-2
$2
doi
035
$a
978-3-030-13057-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
D44 2019
072
7
$a
UN
$2
bicssc
072
7
$a
COM021000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
D311 2019
245
0 0
$a
Deep learning applications for cyber security
$h
[electronic resource] /
$c
edited by Mamoun Alazab, MingJian Tang.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xx, 246 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advanced sciences and technologies for security applications,
$x
1613-5113
505
0
$a
Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft -- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems -- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks -- Using Convolutional Neural Networks for Classifying Malicious Network Traffic -- DBD: Deep Learning DGA-based Botnet Detection -- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks -- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach -- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks -- Forensic Detection of Child Exploitation Material using Deep Learning -- Toward Detection of Child Exploitation Material: A Forensic Approach.
520
$a
Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points.
650
0
$a
Computer security.
$3
184416
650
1 4
$a
Big Data.
$3
760530
650
2 4
$a
Cybercrime.
$3
748274
650
2 4
$a
Mathematical Models of Cognitive Processes and Neural Networks.
$3
567118
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Security Science and Technology.
$3
510148
700
1
$a
Alazab, Mamoun.
$3
878260
700
1
$a
Tang, MingJian.
$3
878261
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Advanced sciences and technologies for security applications.
$3
738348
856
4 0
$u
https://doi.org/10.1007/978-3-030-13057-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000190497
電子館藏
1圖書
電子書
EB QA76.9.A25 D311 2019 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-13057-2
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入