Details

Title Advances in information security, privacy, and ethics (AISPE) book series. — Applications of machine learning and deep learning for privacy and cybersecurity
Other creators Lobo Victor ; Correia Anacleto
Collection Электронные книги зарубежных издательств ; Общая коллекция
Subjects Computer networks — Security measures — Data processing. ; Computer security. ; Deep learning (Machine learning) ; EBSCO eBooks
Document type Other
File type PDF
Language English
Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
Record key on1287926329
Record create date 11/4/2021

Allowed Actions

pdf/3380199.pdf
Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network
epub/3380199.epub
Action 'Download' will be available if you login or access site from another network
Group Anonymous
Network Internet

"This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations"--.

Network User group Action
ILC SPbPU Local Network All
Read Print Download
Internet Authorized users SPbPU
Read Print Download
Internet Anonymous
  • Cover
  • Title Page
  • Copyright Page
  • Book Series
  • Table of Contents
  • Detailed Table of Contents
  • Preface
  • Chapter 1: User Profiling Using Keystroke Dynamics and Rotation Forest
  • Chapter 2: Predictive Modelling for Financial Fraud Detection Using Data Analytics
  • Chapter 3: Comprehensive Overview of Autonomous Vehicles and Their Security Against DDoS Attacks
  • Chapter 4: Application of Machine Learning to User Behavior-Based Authentication in Smartphone and Web
  • Chapter 5: The Role of Deception in Securing Our Cyberspace
  • Chapter 6: Holistic View on Detecting DDoS Attacks Using Machine Learning
  • Chapter 7: Masked Transient Effect Ring Oscillator Physical Unclonable Function Against Machine Learning Attacks
  • Chapter 8: Detecting Bank Financial Fraud in South Africa Using a Logistic Model Tree
  • Chapter 9: Innovative Legitimate Non-Traditional Doctorate Programs in Cybersecurity, Engineering, and Technology
  • Chapter 10: Privacy Preservation of Image Data With Machine Learning
  • Compilation of References
  • Related References
  • About the Contributors
  • Index
pdf/3380199.pdf

Access count: 0 
Last 30 days: 0

Detailed usage statistics

epub/3380199.epub

Access count: 0 
Last 30 days: 0

Detailed usage statistics