Applied cloud deep semantic recognition advanced anomaly detection

This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection. In each chapter, it identifies advanced anomaly detection and key assumpt...

Full description

Saved in:
Bibliographic Details
Other Authors: Roopaei, Mehdi (Editor), Rad, Paul (Editor)
Format: Book
Language:English
Published: Boca Raton, FL CRC Press, Taylor & Francis Group [2018]
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 53548
003 MY-KLNDU
005 20241219014503.0
008 221104s2018 flua b 001 0 eng d
020 |a 9781138302228 
039 9 |a 202211041231  |b VLOAD  |c 201911011026  |d azraai  |y 201904111027  |z helmey 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.5913  |b .A67 2018 
245 0 0 |a Applied cloud deep semantic recognition  |b advanced anomaly detection  |c edited by Mehdi Roopaei, Paul Rad 
264 1 |a Boca Raton, FL  |b CRC Press, Taylor & Francis Group  |c [2018] 
264 4 |c ©2018 
300 |a xiii, 187 pages  |b illustrations  |c 27 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index 
520 |a This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection. In each chapter, it identifies advanced anomaly detection and key assumptions, which are used by the model to differentiate between normal and anomalous behavior. When applying a given model to a particular application, the assumptions can be used as guidelines to assess the effectiveness of the model in that domain. Each chapter provides an advanced deep content understanding and anomaly detection algorithm, and then shows how the proposed approach is deviating of the basic techniques. Further, for each chapter, it describes the advantages and disadvantages of the algorithm. The final chapters provide a discussion on the computational complexity of the models and graph computational frameworks such as Google Tensorflow and H2O because it is an important issue in real application domains. This book provides a better understanding of the different directions in which research has been done on deep semantic analysis and situational assessment using deep learning for anomalous detection, and how methods developed in one area can be applied in applications in other domains. This book seeks to provide both cyber analytics practitioners and researchers an up-to-date and advanced knowledge in cloud based frameworks for deep semantic analysis and advanced anomaly detection using cognitive and artificial intelligence (AI) models. 
592 |a 37653  |b 8/8/19  |c RM504.93  |h Bookline Services 
650 0 |a Semantic computing 
650 0 |a Anomaly detection (Computer security) 
650 0 |a Invisible Web 
700 1 |a Roopaei, Mehdi  |e editor 
700 1 |a Rad, Paul  |e editor 
999 |a vtls000063640  |c 53548  |d 53548