Machine Learning in Cyber Trust: Security, Privacy, and Reliability

ISBN 10: 1441946985 ISBN 13: 9781441946980
Verlag: Springer, 2010
Neu Softcover

Verkäufer Ria Christie Collections, Uxbridge, Vereinigtes Königreich Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

AbeBooks-Verkäufer seit 25. März 2015


Beschreibung

Beschreibung:

In. Bestandsnummer des Verkäufers ria9781441946980_new

Diesen Artikel melden

Inhaltsangabe:

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.

Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Von der hinteren Coverseite:

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work.

Specific features include the following:

  • A survey of various approaches using machine learning/data mining techniques to enhance the traditional security mechanisms of databases
  • A discussion of detection of SQL Injection attacks and anomaly detection for defending against insider threats
  • An approach to detecting anomalies in a graph-based representation of the data collected during the monitoring of cyber and other infrastructures
  • An empirical study of seven online-learning methods on the task of detecting malicious executables
  • A novel network intrusion detection framework for mining and detecting sequential intrusion patterns
  • A solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems
  • An image encryption algorithm based on a chaotic cellular neural network to deal with information security and assurance
  • An overview of data privacy research, examining the achievements, challenges and opportunities while pinpointing individual research efforts on the grand map of data privacy protection
  • An algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data
  • An approach for assessing the reliability of SOA-based systems using AI reasoning techniques
  • The models, properties, and applications of context-aware Web services, including an ontology-based context model to enable formal description and acquisition of contextual information pertaining to service requestors and services

Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

Bibliografische Details

Titel: Machine Learning in Cyber Trust: Security, ...
Verlag: Springer
Erscheinungsdatum: 2010
Einband: Softcover
Zustand: New

Beste Suchergebnisse beim ZVAB

Foto des Verkäufers

Jeffrey J P Tsai (u. a.)
Verlag: Springer Us, 2010
ISBN 10: 1441946985 ISBN 13: 9781441946980
Neu Taschenbuch

Anbieter: preigu, Osnabrück, Deutschland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Taschenbuch. Zustand: Neu. Machine Learning in Cyber Trust | Security, Privacy, and Reliability | Jeffrey J P Tsai (u. a.) | Taschenbuch | xvi | Englisch | 2010 | Springer Us | EAN 9781441946980 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu. Artikel-Nr. 107152061

Verkäufer kontaktieren

Neu kaufen

EUR 146,10
EUR 70,00 shipping
Versand von Deutschland nach USA

Anzahl: 5 verfügbar

In den Warenkorb

Foto des Verkäufers

Jeffrey J P Tsai
Verlag: Springer Us, 2010
ISBN 10: 1441946985 ISBN 13: 9781441946980
Neu Taschenbuch

Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks. Artikel-Nr. 9781441946980

Verkäufer kontaktieren

Neu kaufen

EUR 176,10
EUR 62,66 shipping
Versand von Deutschland nach USA

Anzahl: 2 verfügbar

In den Warenkorb