Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Machine Intelligence and Big Data Analytics for Cybersecurity Applications

Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9783030570248
Veröffentl:
2020
Seiten:
539
Autor:
Yassine Maleh
Serie:
919, Studies in Computational Intelligence
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:

This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks but also because of the large scale and complex nature of today's IT infrastructures. It discusses novel trends and achievements in machine intelligence and their role in the development of secure systems and identifies open and future research issues related to the application of machine intelligence in the cybersecurity field. Bridging an important gap between machine intelligence, big data, and cybersecurity communities, it aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploringthe latest advances on machine intelligence and big data analytics for cybersecurity applications.
Network Intrusion Detection: Taxonomy and Machine Learning Applications.- Machine Learning and Deep Learning models for Big Data Issues.- The Fundamentals and Potential for Cybersecurity of Big Data in the Modern World.- Improving Cyber-Threat Detection by Moving the Boundary around the Normal Samples.- Bayesian Networks for Online Threat Detection.- Network Intrusion Detection for TCP/IP Packets with Machine Learning Techniques.- Developing a Blockchain-based and Distributed Database-oriented Multi-Malware Detection Engine.- Classifying Common Vulnerabilities and Exposures Database Using Text Mining and Graph Theoretical Analysis.- Robust Cryptographical Applications for a Secure Wireless Network Protocol.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga