Handbook of research on machine and deep learning applications for cyber security
"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"
Saved in:
| Other Authors: | Ganapathi, Padmavathi, 1964 (Editor), Shanmugapriya, D., 1978 (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
IGI Global, Information Science Reference (an imprint of IGI Global)
[2020]
|
| Series: | A volume in the advances in information security, privacy, and ethics (AISPE) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Machine learning and cognitive science applications in cyber security
Published: (2019)
Published: (2019)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Machine learning and security protecting systems with data and algorithms
by: Chio, Clarence, et al.
Published: (2018)
by: Chio, Clarence, et al.
Published: (2018)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Enhancing software fault prediction with machine learning emerging research and opportunities
by: Rashid, Ekbal
Published: (2018)
by: Rashid, Ekbal
Published: (2018)
Machine and Deep Learning Using MATLAB : Algorithms and Tools for Scientists and Engineers /
by: Al-Malah, Kamal I. M.
Published: (2024)
by: Al-Malah, Kamal I. M.
Published: (2024)
Hands-on machine learning for cybersecurity safeguard your system by making your machines intelligent using the Python ecosystem
by: Halder, Soma, et al.
Published: (2018)
by: Halder, Soma, et al.
Published: (2018)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Data science for cyber-security
Published: (2019)
Published: (2019)
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Machine learning for financial engineering
by: Gyorfi, Laszlo, et al.
Published: (2012)
by: Gyorfi, Laszlo, et al.
Published: (2012)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
Anti-hacker tool kit
by: Shema, Mike
Published: (2014)
by: Shema, Mike
Published: (2014)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Handbook of research on information and cyber security in the fourth industrial revolution
Published: (2018)
Published: (2018)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Cryptography and network security principles and practices
by: Stallings
Published: (2006)
by: Stallings
Published: (2006)
Building secure and reliable networks applications
by: Birman
Published: (1996)
by: Birman
Published: (1996)
Similar Items
-
Machine learning and cognitive science applications in cyber security
Published: (2019) -
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017) -
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019) -
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018) -
Network security attacks and countermeasures
Published: (2016)


