
Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices
Brij B. / Sheng Gupta
Résumé
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques.
This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals.
Key Features:
-
- This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security.
-
- It showcases important security aspects and current trends in the field.
-
- It provides an insight of the future research directions in the field.
-
- Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.
-
Table of Contents:
-
- A Deep Learning-Based System for Network Cyber Threat Detection
-
Angel Luis Perales Gomez, Lorenzo Fernandez Maimo and Felix J. Garcia Clemente
- Machine learning for phishing detection and mitigation
-
Mohammad Alauthman, Ammar Almomani, Mohammed Alweshah, Waleed Alomoush and Kamal Alieyan
- Next Generation Adaptable Opportunistic Sensing Based Wireless Sensor Networks: A Machine Learning Perspective
-
Jasminder Sandhu, Anil Verma and Prashant Rana
- A Bio-inspired Approach to Cyber Security
-
Siyakha Mthunzi, Elhadj Benkhelifa, Tomasz Bosakowski and Salim Hariri
- Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks
-
Izzat Alsmadi and Muhammad Al-Abdullah
- A deep-dive on Machine learning for Cybersecurity use cases
-
Vinayakumar R, Soman Kp, Prabaharan Poornachandran and Pradeep Menon
- Droid-Sec: A Prototype Method to Discover Malwares in Android-Based Smart Phones through System Calls
-
B. B. Gupta, Shashank Gupta, Shubham Goel, Nihit Bhardwaj, and Jaiveer Singh
- Metaheuristic Algorithms Based Feature Selection Approach for Intrusion Detection
-
Mohammed Al-Weshah, Saleh Al Khalayleh, Ammar Almomani, Mohammed Al-Refai and Riyadh Qashi
- A Taxonomy of Bitcoin Security Issues and Defense Mechanisms
-
Prachi Gulihar and B. B. Gupta
- Early Detection and Prediction of Lung Cancer using Machine Learning Algorithms Applied on a Secure Healthcare Data System Architecture
-
Mohamed Alloghani, Thar Baker, Dhiya Al-Jumeily, Abir Hussain, Ahmed Kaky and Jamila Mustafina
- Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake Based Malicious Behavior Detection Mechanism
-
Bhawna Singla, A.K. Verma and L.R. Raheja
- Detecting Controller Interlock based Tax Evasion Groups in a Corporate Governance Network
-
Jianfei Ruan, Zheng Yan, Bo Dong and Qinghua Zheng
- Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms
-
Shashank Tripathi, Pranav Saxena, Harsh Dwivedi and Shashank Gupta
- Importance of Providing Incentives and Economic Solutions in IT Security
-
A. Dhahiya, and B. B. Gupta
- Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-Efficacy into a Game Application
-
Nalin Asanka Gamagedara Arachchilage, and Mumtaz Abdul Hameed
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Taylor&francis |
Auteur(s) | Brij B. / Sheng Gupta |
Parution | 12/02/2019 |
Nb. de pages | 352 |
EAN13 | 9781138587304 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse