Applications of machine learning and deep learning for privacy and cybersecurity / Victor Lobo, Anacleto Correia.

Contributor(s): Lobo, Victor, 1965- [editor.] | Correia, Anacleto, 1961- [editor.].
Material type: materialTypeLabelBookSeries: Advances in information security, privacy, and ethics (AISPE) book series: Publisher: Hershey, PA : Information Science Reference, an imprint of IGI Global, [2022]Description: 1 online resource (xxi, 271 pages) : illustrations (chiefly color).Content type: text Media type: computer Carrier type: online resourceISBN: 9781799894322; 1799894320; 9781799894339; 1799894339.Call No.: TK5105.59 .A67 2022 Subject(s): Computer networks -- Security measures -- Data processing | Computer security | Deep learning (Machine learning) | Computer security | Deep learning (Machine learning)Genre/Form: Electronic books.Additional physical formats: Print version:: Applications of machine learning and deep learning for privacy and cybersecurityDDC classification: 005.8 Online resources: EBSCOhost
Contents:
Chapter 1. User profiling using keystroke dynamics and rotation forest -- Chapter 2. Predictive modelling for financial fraud detection using data analytics: a gradient-boosting decision tree -- Chapter 3. Comprehensive overview of autonomous vehicles and their security against DDoS attacks -- Chapter 4. Application of machine learning to user behavior-based authentication in smartphone and web -- Chapter 5. The role of deception in securing our cyberspace: honeypots are a viable option -- Chapter 6. Holistic view on detecting DDoS attacks using machine learning -- Chapter 7. Masked transient effect ring oscillator physical unclonable function against machine learning attacks -- Chapter 8. Detecting bank financial fraud in South Africa using a logistic model tree -- Chapter 9. Innovative legitimate non-traditional doctorate programs in cybersecurity, engineering, and technology -- Chapter 10. Privacy preservation of image data with machine learning.
Bibliography, etc. Note: Includes bibliographical references and index.Local Note(s): Added to collection customer.56279.3Summary: "This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

Chapter 1. User profiling using keystroke dynamics and rotation forest -- Chapter 2. Predictive modelling for financial fraud detection using data analytics: a gradient-boosting decision tree -- Chapter 3. Comprehensive overview of autonomous vehicles and their security against DDoS attacks -- Chapter 4. Application of machine learning to user behavior-based authentication in smartphone and web -- Chapter 5. The role of deception in securing our cyberspace: honeypots are a viable option -- Chapter 6. Holistic view on detecting DDoS attacks using machine learning -- Chapter 7. Masked transient effect ring oscillator physical unclonable function against machine learning attacks -- Chapter 8. Detecting bank financial fraud in South Africa using a logistic model tree -- Chapter 9. Innovative legitimate non-traditional doctorate programs in cybersecurity, engineering, and technology -- Chapter 10. Privacy preservation of image data with machine learning.

"This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations"-- Provided by publisher.

Description based on online resource; title from digital title page (viewed on October 04, 2022).

Added to collection customer.56279.3

There are no comments for this item.

to post a comment.


- Copyright © 2022 Library and Learning Space -

Powered by Koha