• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Machine learning and data mining for computer security :

پدید آورنده
Marcus A. Maloof (ed.).

موضوع
Computer security.,Data mining.,Machine learning.,Apprentissage automatique.,Exploration de données (Informatique),Sécurité informatique.,Apprentissage automatique.,Computer security.,Computer security.,Computerbeveiliging.,Computerbeveiliging.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data mining.,Data mining.,Data mining.,Exploration de données (Informatique),Informatique.,Kunstmatige intelligentie.,Kunstmatige intelligentie.,Machine learning.,Machine learning.,Sécurité informatique.

رده
QA76
.
9
.
A25
M3135
2006eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1280461926
(Number (ISBN
184628029X
(Number (ISBN
1846282535
(Number (ISBN
1849965447
(Number (ISBN
6610461929
(Number (ISBN
9781280461927
(Number (ISBN
9781846280290
(Number (ISBN
9781846282539
(Number (ISBN
9781849965446
(Number (ISBN
9786610461929

NATIONAL BIBLIOGRAPHY NUMBER

Number
b748088

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Machine learning and data mining for computer security :
General Material Designation
[Book]
Other Title Information
methods and applications /
First Statement of Responsibility
Marcus A. Maloof (ed.).

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
London :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
©2006.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xvi, 210 pages) :
Other Physical Details
illustrations

SERIES

Series Title
Advanced information and knowledge processing

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references (pages 179-198) and index.

CONTENTS NOTE

Text of Note
Survey Contributions -- An Introduction to Information Assurance -- Some Basic Concept of Machine Learning and Data Mining -- Research Contributions -- Learning to Detect Malicious Executables -- Data Mining Applied to Intrusion Detection: MITRE Experiences -- Intrusion Detection Alarm Clustering -- Behavioral Features for Network Anomaly Detection -- Cost-Sensitive Modeling for Intrusion Detection -- Data Cleaning and Enriched Representations for Anomaly Detection in System Calls -- A Decision-Theoritic, Semi-Supervised Model for Intrusion Detection.
0

SUMMARY OR ABSTRACT

Text of Note
The Internet began as a private network connecting government, military, and academic researchers. As such, there was little need for secure protocols, encrypted packets, and hardened servers. When the creation of the World Wide Web unexpectedly ushered in the age of the commercial Internet, the network's size and subsequent rapid expansion made it impossible retroactively to apply secure mechanisms. The Internet's architects never coined terms such as spam, phishing, zombies, and spyware, but they are terms and phenomena we now encounter constantly. Programming detectors for such threats has proven difficult. Put simply, there is too much information--too many protocols, too many layers, too many applications, and too many uses of these applications--for anyone to make sufficient sense of it all. Ironically, given this wealth of information, there is also too little information about what is important for detecting attacks. Methods of machine learning and data mining can help build better detectors from massive amounts of complex data. Such methods can also help discover the information required to build more secure systems. For some problems in computer security, one can directly apply machine learning and data mining techniques. Other problems, both current and future, require new approaches, methods, and algorithms. This book presents research conducted in academia and industry on methods and applications of machine learning and data mining for problems in computer security and will be of interest to researchers and practitioners, as well students. 'Dr. Maloof not only did a masterful job of focusing the book on a critical area that was in dire need of research, but he also strategically picked papers that complemented each other in a productive manner. ... This book is a must read for anyone interested in how research can improve computer security.' Dr Eric Cole, Computer Security Expert.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Springer
Stock Number
978-1-84628-029-0

OTHER EDITION IN ANOTHER MEDIUM

Title
Machine learning and data mining for computer security.
International Standard Book Number
9781846280290

TOPICAL NAME USED AS SUBJECT

Computer security.
Data mining.
Machine learning.
Apprentissage automatique.
Exploration de données (Informatique)
Sécurité informatique.
Apprentissage automatique.
Computer security.
Computer security.
Computerbeveiliging.
Computerbeveiliging.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.
Data mining.
Data mining.
Data mining.
Exploration de données (Informatique)
Informatique.
Kunstmatige intelligentie.
Kunstmatige intelligentie.
Machine learning.
Machine learning.
Sécurité informatique.

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040
UMA

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
M3135
2006eb

OTHER CLASS NUMBERS

Class number
54
.
64
Class number
TP309
System Code
bcl
System Code
clc

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Maloof, Marcus A.

ORIGINATING SOURCE

Date of Transaction
20201204080917.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival