Показать сокращенную информацию
dc.contributor.author | Lobo Victor | |
dc.contributor.author | Correia Anacleto | |
dc.date.accessioned | 2024-01-29T22:29:00Z | |
dc.date.available | 2024-01-29T22:29:00Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Applications of machine learning and deep learning for privacy and cybersecurity Advances in information security, privacy, and ethics (AISPE) book series. - 1 online resource (xxi, 271 pages) : - URL: https://libweb.kpfu.ru/ebsco/pdf/3380199.pdf | |
dc.identifier.isbn | 9781799894322 | |
dc.identifier.isbn | 1799894320 | |
dc.identifier.isbn | 9781799894339 | |
dc.identifier.isbn | 1799894339 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/180766 | |
dc.description | Includes bibliographical references and index. | |
dc.description.abstract | "This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations"-- | |
dc.description.tableofcontents | Chapter 1. User profiling using keystroke dynamics and rotation forest -- Chapter 2. Predictive modelling for financial fraud detection using data analytics: a gradient-boosting decision tree -- Chapter 3. Comprehensive overview of autonomous vehicles and their security against DDoS attacks -- Chapter 4. Application of machine learning to user behavior-based authentication in smartphone and web -- Chapter 5. The role of deception in securing our cyberspace: honeypots are a viable option -- Chapter 6. Holistic view on detecting DDoS attacks using machine learning -- Chapter 7. Masked transient effect ring oscillator physical unclonable function against machine learning attacks -- Chapter 8. Detecting bank financial fraud in South Africa using a logistic model tree -- Chapter 9. Innovative legitimate non-traditional doctorate programs in cybersecurity, engineering, and technology -- Chapter 10. Privacy preservation of image data with machine learning. | |
dc.language | English | |
dc.language.iso | en | |
dc.relation.ispartofseries | Advances in information security, privacy, and ethics (AISPE) book series | |
dc.relation.ispartofseries | Advances in information security, privacy, and ethics (AISPE) book series. | |
dc.subject.other | Computer networks -- Security measures -- Data processing. | |
dc.subject.other | Computer security. | |
dc.subject.other | Deep learning (Machine learning) | |
dc.subject.other | Computer security. | |
dc.subject.other | Deep learning (Machine learning) | |
dc.subject.other | Electronic books. | |
dc.title | Applications of machine learning and deep learning for privacy and cybersecurity Advances in information security, privacy, and ethics (AISPE) book series./ Victor Lobo, Anacleto Correia. | |
dc.type | Book | |
dc.description.pages | 1 online resource (xxi, 271 pages) : | |
dc.collection | Электронно-библиотечные системы | |
dc.source.id | EN05CEBSCO05C203028 |