Applications of machine learning and deep learning for privacy and cybersecurity / (Record no. 257197)

000 -LEADER
fixed length control field 02598nam a2200337 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field TH-BaBU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240717090110.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211104s2022 paua fob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency TH-BaBU
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781799894322 (electronic bk.)
International Standard Book Number 9781799894308
International Standard Book Number 9781799894315
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .A67 2022
245 00 - TITLE STATEMENT
Title Applications of machine learning and deep learning for privacy and cybersecurity /
Statement of responsibility, etc. Victor Lobo, Anacleto Correia.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hershey, Pa. :
Name of producer, publisher, distributor, manufacturer Information Science Reference, an imprint of IGI Global,
Date of production, publication, distribution, manufacture, or copyright notice ©2022
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Advances in information security, privacy, and ethics (AISPE) book series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. User profiling using keystroke dynamics and rotation forest -- Chapter 2. Predictive modelling for financial fraud detection using data analytics: a gradient-boosting decision tree -- Chapter 3. Comprehensive overview of autonomous vehicles and their security against DDoS attacks -- Chapter 4. Application of machine learning to user behavior-based authentication in smartphone and web -- Chapter 5. The role of deception in securing our cyberspace: honeypots are a viable option -- Chapter 6. Holistic view on detecting DDoS attacks using machine learning -- Chapter 7. Masked transient effect ring oscillator physical unclonable function against machine learning attacks -- Chapter 8. Detecting bank financial fraud in South Africa using a logistic model tree -- Chapter 9. Innovative legitimate non-traditional doctorate programs in cybersecurity, engineering, and technology -- Chapter 10. Privacy preservation of image data with machine learning.
520 ## - SUMMARY, ETC.
Summary, etc. "This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Data processing.
Topical term or geographic name entry element Computer security.
Topical term or geographic name entry element Deep learning (Machine learning)
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lobo, Victor,
Dates associated with a name 1965-,
Relator term editor.
Personal name Correia, Anacleto,
Dates associated with a name 1961-,
Relator term editor.
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3380199">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3380199</a>
Public note Electronic Resources
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type E-Book

No items available.


- Copyright © 2022 Library and Learning Space -

Powered by Koha