• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
Machine learning for computer and cyber security :

پدید آورنده
editors, Brij B. Gupta, Michael Sheng.

موضوع
Artificial intelligence.,Computer networks-- Security measures-- Data processing.,Computer security-- Data processing.,Machine learning.,Artificial intelligence.,COMPUTERS-- Database Management-- Data Mining.,COMPUTERS-- General.,COMPUTERS-- Machine Theory.,Machine learning.,MATHEMATICS-- Arithmetic.

رده
TK5105
.
59

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0429504047
(Number (ISBN
0429995709
(Number (ISBN
0429995717
(Number (ISBN
0429995725
(Number (ISBN
9780429504044
(Number (ISBN
9780429995705
(Number (ISBN
9780429995712
(Number (ISBN
9780429995729
Erroneous ISBN
9781138587304

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Machine learning for computer and cyber security :
General Material Designation
[Book]
Other Title Information
principles, algorithms, and practices /
First Statement of Responsibility
editors, Brij B. Gupta, Michael Sheng.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boca Raton :
Name of Publisher, Distributor, etc.
CRC Press,
Date of Publication, Distribution, etc.
[2019]
Date of Publication, Distribution, etc.
©2019

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
Text of Note
12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index
Text of Note
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
0
8
8

SUMMARY OR ABSTRACT

Text of Note
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.

OTHER EDITION IN ANOTHER MEDIUM

Title
Machine learning for computer and cyber security : principles, algorithms, and practices.
International Standard Book Number
9781138587304.

TOPICAL NAME USED AS SUBJECT

Artificial intelligence.
Computer networks-- Security measures-- Data processing.
Computer security-- Data processing.
Machine learning.
Artificial intelligence.
COMPUTERS-- Database Management-- Data Mining.
COMPUTERS-- General.
COMPUTERS-- Machine Theory.
Machine learning.
MATHEMATICS-- Arithmetic.

(SUBJECT CATEGORY (Provisional

COM-- 000000
COM-- 021030
COM-- 037000
MAT-- 004000
UY

DEWEY DECIMAL CLASSIFICATION

Number
006
.
3/1
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
59

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Gupta, Brij,1982-
Sheng, Quan Z.

ORIGINATING SOURCE

Date of Transaction
20200822112034.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival