000 | 03217nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-981-15-1706-8 | ||
003 | DE-He213 | ||
005 | 20240423125012.0 | ||
007 | cr nn 008mamaa | ||
008 | 191216s2020 si | s |||| 0|eng d | ||
020 |
_a9789811517068 _9978-981-15-1706-8 |
||
024 | 7 |
_a10.1007/978-981-15-1706-8 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aThomas, Tony. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aMachine Learning Approaches in Cyber Security Analytics _h[electronic resource] / _cby Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2020. |
|
300 |
_aXI, 209 p. 76 illus., 43 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aChapter 1. Introduction -- Chapter 2. Machine Learning Algorithms -- Chapter 3. Machine Learning in Cyber Security Analytics -- Chapter 4. Applications of Support Vector Machines -- Chapter 5. Applications of Nearest Neighbor -- Chapter 6. Applications of Clustering -- Chapter 7. Applications of Dimensionality Reduction -- Chapter 8. Applications of other Machine Learning Methods. | |
520 | _aThis book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks. . | ||
650 | 0 | _aData protection. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer crimes. | |
650 | 0 |
_aArtificial intelligence _xData processing. |
|
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aCybercrime. |
650 | 2 | 4 | _aData Science. |
700 | 1 |
_aP. Vijayaraghavan, Athira. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aEmmanuel, Sabu. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811517051 |
776 | 0 | 8 |
_iPrinted edition: _z9789811517075 |
776 | 0 | 8 |
_iPrinted edition: _z9789811517082 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-15-1706-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c173112 _d173112 |