Cargando…

Machine learning for computer and cyber security : principles, algorithms, and practices /

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer net...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Gupta, Brij, 1982- (Editor ), Sheng, Quan Z. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, Taylor & Francis Group, [2019]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_on1084727081
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu|||unuuu
008 190207t20192019flua ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d EBLCP  |d COO  |d OCLCF  |d TYFRS  |d UKAHL  |d OCLCQ  |d BWN  |d WAU  |d OCLCO  |d NLW  |d OCLCO  |d VHC  |d OCLCO  |d AAA  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1165833466  |a 1274881445  |a 1303425382 
020 |a 9780429504044  |q (electronic book) 
020 |a 0429504047  |q (electronic book) 
020 |a 9780429995729  |q (PDF) 
020 |a 0429995725  |q (PDF) 
020 |a 9780429995712  |q (EPUB) 
020 |a 0429995717  |q (EPUB) 
020 |a 9780429995705  |q (Mobipocket) 
020 |a 0429995709  |q (Mobipocket) 
020 |z 9781138587304  |q (hardback) 
024 7 |a 10.1201/9780429504044.  |2 doi 
029 1 |a AU@  |b 000069373811 
035 |a (OCoLC)1084727081  |z (OCoLC)1165833466  |z (OCoLC)1274881445  |z (OCoLC)1303425382 
037 |a 9780429995712  |b Ingram Content Group 
050 4 |a TK5105.59 
072 7 |a COM  |x 000000  |2 bisacsh 
072 7 |a COM  |x 021030  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a MAT  |x 004000  |2 bisacsh 
072 7 |a UY  |2 bicssc 
082 0 4 |a 006.3/1  |2 23 
049 |a UAMI 
245 0 0 |a Machine learning for computer and cyber security :  |b principles, algorithms, and practices /  |c editors, Brij B. Gupta, Michael Sheng. 
264 1 |a Boca Raton, FL :  |b CRC Press, Taylor & Francis Group,  |c [2019] 
264 4 |c ©2019 
300 |a 1 online resource (xii, 352 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
336 |a still image  |b sti  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a 1. A Deep Learning-based System for Network Cyber Threat Detection -- 2. Machine Learning for Phishing Detection and Mitigation -- 3. Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective -- 4. A Bio-inspired Approach to Cyber Security -- 5. Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks -- 6. A Deep-dive on Machine Learning for Cyber Security Use Cases -- 7. A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls -- 8. Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection -- 9. A Taxonomy of Bitcoin Security Issues and Defense Mechanisms -- 10. Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture -- 11. Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection -- 12. Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network -- 13. Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms -- 14. Importance of Providing Incentives and Economic Solutions in IT Security -- 15. Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application 
520 |a While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. 
545 0 |a Brij B. Gupta received PhD degree from Indian Institute of Technology Roorkee, India in Information and Cyber Security. He published more than 175 research papers in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, Inderscience, etc. He has visited several countries, i.e. Canada, Japan, Malaysia, Australia, China, Hong-Kong, Italy, Spain etc to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. Dr. Gupta also received Young Faculty research fellowship award from Ministry of Electronics and Information Technology, Government of India in 2017. He is also working as principal investigator of various R&D projects. He is serving as associate editor of IEEE Access, IEEE TII, and Executive editor of IJITCA, Inderscience, respectively. At present, Dr. Gupta is working as Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes Information security, Cyber Security, Mobile security, Cloud Computing, Web security, Intrusion detection and Phishing. Michael Sheng is a full Professor and Head of Department of Computing at Macquarie University. Before moving to Macquarie, Michael spent 10 years at School of Computer Science, the University of Adelaide (UoA). Michael holds a PhD degree in computer science from the University of New South Wales (UNSW) and did his post-doc as a research scientist at CSIRO ICT Centre. From 1999 to 2001, Sheng also worked at UNSW as a visiting research fellow. Prior to that, he spent 6 years as a senior software engineer in industries. Prof. Sheng has more than 280 publications as edited books and proceedings, refereed book chapters, and refereed technical papers in journals and conferences including ACM Computing Surveys, ACM TOIT, ACM TOMM, ACM TKDD, VLDB Journal, Computer (Oxford), IEEE TPDS, TKDE, DAPD, IEEE TSC, WWWJ, IEEE Computer, IEEE Internet Computing, Communications of the ACM, VLDB, ICDE, ICDM, CIKM, EDBT, WWW, ICSE, ICSOC, ICWS, and CAiSE. Dr. Michael Sheng is the recipient of the ARC Future Fellowship (2014), Chris Wallace Award for Outstanding Research Contribution (2012), and Microsoft Research Fellowship (2003). He is a member of the IEEE and the ACM. Homepage: https://web.science.mq.edu.au/~qsheng 
588 0 |a Print version record. 
506 1 |a Legal Deposit;  |c Only available on premises controlled by the deposit library and to one user at any one time;  |e The Legal Deposit Libraries (Non-Print Works) Regulations (UK).  |5 WlAbNL 
540 |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.  |5 WlAbNL 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures  |x Data processing. 
650 0 |a Computer security  |x Data processing. 
650 0 |a Machine learning. 
650 0 |a Artificial intelligence. 
650 2 |a Artificial Intelligence 
650 2 |a Machine Learning 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Informatique. 
650 6 |a Sécurité informatique  |x Informatique. 
650 6 |a Apprentissage automatique. 
650 6 |a Intelligence artificielle. 
650 7 |a artificial intelligence.  |2 aat 
650 7 |a COMPUTERS  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Database Management  |x Data Mining.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a MATHEMATICS  |x Arithmetic.  |2 bisacsh 
650 7 |a Artificial intelligence  |2 fast 
650 7 |a Machine learning  |2 fast 
700 1 |a Gupta, Brij,  |d 1982-  |e editor.  |1 https://id.oclc.org/worldcat/entity/E39PCjwrQP4fqHqygcyjgYM3wC 
700 1 |a Sheng, Quan Z.,  |e editor. 
776 0 8 |i Print version:  |t Machine learning for computer and cyber security.  |d Boca Raton, FL : CRC Press, Taylor & Francis Group, [2019]  |z 9781138587304  |w (DLC) 2018054743  |w (OCoLC)1076412952 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5675759  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35392632 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5675759 
938 |a EBSCOhost  |b EBSC  |n 2023478 
994 |a 92  |b IZTAP