Machine learning and cognitive science applications in cyber security
"This book addresses the gap between how researchers do cyber security analysis and how an industrial security professional look at the problem of detecting threats"--
Saved in:
| Other Authors: | Khan, Muhammad Salman 1979 (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, Pa
IGI Global
2019
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Handbook of research on machine and deep learning applications for cyber security
Published: (2020)
Published: (2020)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Machine learning and security protecting systems with data and algorithms
by: Chio, Clarence, et al.
Published: (2018)
by: Chio, Clarence, et al.
Published: (2018)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Hands-on machine learning for cybersecurity safeguard your system by making your machines intelligent using the Python ecosystem
by: Halder, Soma, et al.
Published: (2018)
by: Halder, Soma, et al.
Published: (2018)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Data science for cyber-security
Published: (2019)
Published: (2019)
The web application hacker's handbook discovering and exploiting security flaws
by: Stuttard, Dafydd
Published: (2008)
by: Stuttard, Dafydd
Published: (2008)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd
Published: (2011)
by: Stuttard, Dafydd
Published: (2011)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
Applied approach to privacy and security for the internet of things
Published: (2020)
Published: (2020)
Modern theories and practices for cyber ethics and security compliance
Published: (2020)
Published: (2020)
Machine Learning and Data Science : Fundamentals and Applications /
Published: (2022)
Published: (2022)
Web security a whitehat perspective
by: Hanqing, Wu, et al.
Published: (2015)
by: Hanqing, Wu, et al.
Published: (2015)
Internet and intranet security
by: OppligerlhRolf
by: OppligerlhRolf
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Cyber reconnaissance, surveillance, and defense
by: Shimonski, Robert
Published: (2014)
by: Shimonski, Robert
Published: (2014)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Hacking exposed unified communications & VoIP security secrets & solutions
by: Collier, Mark D., et al.
Published: (2014)
by: Collier, Mark D., et al.
Published: (2014)
Machine learning
by: Mitchell, Tom M. (Tom Michael) 1951-
Published: (1997)
by: Mitchell, Tom M. (Tom Michael) 1951-
Published: (1997)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Building internet firewalls
by: ZwickylhElizabeth D.
by: ZwickylhElizabeth D.
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Similar Items
-
Handbook of research on machine and deep learning applications for cyber security
Published: (2020) -
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018) -
Machine learning and security protecting systems with data and algorithms
by: Chio, Clarence, et al.
Published: (2018) -
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017) -
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)


