Details

Title Handbook of research on machine and deep learning applications for cyber security
Other creators Ganapathi Padmavathi ; Shanmugapriya D.,
Organization IGI Global,
Collection Электронные книги зарубежных издательств ; Общая коллекция
Subjects Computer networks — Security measures. ; Computer security — Data processing. ; Computer crimes — Prevention — Data processing. ; Machine learning. ; EBSCO eBooks
Document type Other
File type PDF
Language English
Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
Record key on1112161788
Record create date 8/13/2019

Allowed Actions

pdf/2227914.pdf
Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network
epub/2227914.epub
Action 'Download' will be available if you login or access site from another network
Group Anonymous
Network Internet

"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--.

Network User group Action
ILC SPbPU Local Network All
Read Print Download
Internet Authorized users SPbPU
Read Print Download
Internet Anonymous
  • Cover
  • Title Page
  • Copyright Page
  • Book Series
  • List of Contributors
  • Table of Contents
  • Detailed Table of Contents
  • Foreword
  • Preface
  • Acknowledgment
  • Chapter 1: Review on Intelligent Algorithms for Cyber Security
  • Chapter 2: A Review on Cyber Security Mechanisms Using Machine and Deep Learning Algorithms
  • Chapter 3: Review on Machine and Deep Learning Applications for Cyber Security
  • Chapter 4: Applications of Machine Learning in Cyber Security Domain
  • Chapter 5: Applications of Machine Learning in Cyber Security
  • Chapter 6: Malware and Anomaly Detection Using Machine Learning and Deep Learning Methods
  • Chapter 7: Cyber Threats Detection and Mitigation Using Machine Learning
  • Chapter 8: Hybridization of Machine Learning Algorithm in Intrusion Detection System
  • Chapter 9: A Hybrid Approach to Detect the Malicious Applications in Android-Based Smartphones Using Deep Learning
  • Chapter 10: Anomaly-Based Intrusion Detection
  • Chapter 11: Traffic Analysis of UAV Networks Using Enhanced Deep Feed Forward Neural Networks (EDFFNN)
  • Chapter 12: A Novel Biometric Image Enhancement Approach With the Hybridization of Undecimated Wavelet Transform and Deep Autoencoder
  • Chapter 13: A 3D-Cellular Automata-Based Publicly-Verifiable Threshold Secret Sharing
  • Chapter 14: Big Data Analytics for Intrusion Detection
  • Chapter 15: Big Data Analytics With Machine Learning and Deep Learning Methods for Detection of Anomalies in Network Traffic
  • Chapter 16: A Secure Protocol for High-Dimensional Big Data Providing Data Privacy
  • Chapter 17: A Review of Machine Learning Methods Applied for Handling Zero-Day Attacks in the Cloud Environment
  • Chapter 18: Adoption of Machine Learning With Adaptive Approach for Securing CPS
  • Chapter 19: Variable Selection Method for Regression Models Using Computational Intelligence Techniques
  • Compilation of References
  • About the Contributors
  • Index
pdf/2227914.pdf

Access count: 2 
Last 30 days: 0

Detailed usage statistics

epub/2227914.epub

Access count: 0 
Last 30 days: 0

Detailed usage statistics