資料來源: Google Book

Applications of machine learning and deep learning for privacy and cybersecurity[electronic resource]

  • 其他作者: Lobo, Victor, , Correia, Anacleto, , IGI Global.
  • 出版: Hershey, Pennsylvania : IGI Global 2022.
  • 稽核項: 1 online resource (271 p.).
  • 標題: Machine learning. , Deep learning (Machine learning). , Computer security. , Data mining. , Electronic books. , Data protection.
  • ISBN: 1799894304 , 9781799894308
  • 試查全文@TNUA:
  • 附註: Includes bibliographical references and index. Chapter 1. User profiling using keystroke dynamics and rotation forest -- Chapter 2. Predictive modelling for financial fraud detection using data analytics: a gradient-boosting decision tree -- Chapter 3. Comprehensive overview of autonomous vehicles and their security against DDoS attacks -- Chapter 4. Application of machine learning to user behavior-based authentication in smartphone and web -- Chapter 5. The role of deception in securing our cyberspace: honeypots are a viable option -- Chapter 6. Holistic view on detecting DDoS attacks using machine learning -- Chapter 7. Masked transient effect ring oscillator physical unclonable function against machine learning attacks -- Chapter 8. Detecting bank financial fraud in South Africa using a logistic model tree -- Chapter 9. Innovative legitimate non-traditional doctorate programs in cybersecurity, engineering, and technology -- Chapter 10. Privacy preservation of image data with machine learning.
  • 摘要: "This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations"--
  • 電子資源: https://dbs.tnua.edu.tw/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-9430-8
  • 系統號: 005331126
  • 資料類型: 電子書
  • 讀者標籤: 需登入
  • 引用網址: 複製連結
"This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations"--
來源: Google Book
評分