Детальная информация
Advances in information security, privacy, and ethics (AISPE) book series.
Applications of machine learning and deep learning for privacy and cybersecurity / Victor Lobo, Anacleto Correia. — 1 online resource (xxi, 271 pages) : illustrations (chiefly color). — (Advances in information security, privacy, and ethics (AISPE) book series). — <URL:http://elib.fa.ru/ebsco/3380199.pdf>.
Дата создания записи
04.11.2021
Тематика
Computer networks — Security measures — Data processing.; Computer security.; Deep learning (Machine learning); Computer security.; Deep learning (Machine learning)
Коллекции
Разрешенные действия
–
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
| Группа | Анонимные пользователи |
|---|---|
| Сеть | Интернет |
"This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations"--.
| Место доступа | Группа пользователей | Действие |
|---|---|---|
| Локальная сеть Финуниверситета | Все |
|
| Интернет | Читатели |
|
| Интернет | Анонимные пользователи |
|
- Cover
- Title Page
- Copyright Page
- Book Series
- Table of Contents
- Detailed Table of Contents
- Preface
- Chapter 1: User Profiling Using Keystroke Dynamics and Rotation Forest
- Chapter 2: Predictive Modelling for Financial Fraud Detection Using Data Analytics
- Chapter 3: Comprehensive Overview of Autonomous Vehicles and Their Security Against DDoS Attacks
- Chapter 4: Application of Machine Learning to User Behavior-Based Authentication in Smartphone and Web
- Chapter 5: The Role of Deception in Securing Our Cyberspace
- Chapter 6: Holistic View on Detecting DDoS Attacks Using Machine Learning
- Chapter 7: Masked Transient Effect Ring Oscillator Physical Unclonable Function Against Machine Learning Attacks
- Chapter 8: Detecting Bank Financial Fraud in South Africa Using a Logistic Model Tree
- Chapter 9: Innovative Legitimate Non-Traditional Doctorate Programs in Cybersecurity, Engineering, and Technology
- Chapter 10: Privacy Preservation of Image Data With Machine Learning
- Compilation of References
- Related References
- About the Contributors
- Index
Количество обращений: 0
За последние 30 дней: 0