Book
Licensed
Unlicensed
Requires Authentication
Machine Learning for Cyber Security
-
Edited by:
Preeti Malik
, Lata Nautiyal and Mangey Ram
Language:
English
Published/Copyright:
2023
About this book
This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools.
Author / Editor information
Preeti Malik, Mangey Ram, Graphic Era University, India; Lata Nautiyal, University of Bristol, UK.
Topics
|
Publicly Available Download PDF |
I |
|
Publicly Available Download PDF |
V |
|
Publicly Available Download PDF |
VII |
|
Publicly Available Download PDF |
IX |
|
Publicly Available Download PDF |
XI |
|
Preeti Malik, Varsha Mittal, Mohit Mittal and Kamika Requires Authentication Unlicensed Licensed |
1 |
|
Krishnadas Nanath and Abdul Rahman Requires Authentication Unlicensed Licensed |
27 |
|
Dinesh C. Dobhal, Kiran Aswal, Heman Pathak and Umesh K. Tiwari Requires Authentication Unlicensed Licensed |
41 |
|
Samuel Wedaj Kibret Requires Authentication Unlicensed Licensed |
71 |
|
Sangeeta Mittal Requires Authentication Unlicensed Licensed |
91 |
|
Vikas Kumar Roy, Vasu Thakur, Nikhil Baliyan, Nupur Goyal and Rahul Nijhawan Requires Authentication Unlicensed Licensed |
117 |
|
Preeti Malik, Ashwini Kumar Singh, Rohit Nautiyal and Swati Rawat Requires Authentication Unlicensed Licensed |
129 |
|
Requires Authentication Unlicensed Licensed |
145 |
Publishing information
Pages and Images/Illustrations in book
eBook published on:
December 5, 2022
eBook ISBN:
9783110766745
Hardcover published on:
December 5, 2022
Hardcover ISBN:
9783110766738
Pages and Images/Illustrations in book
Front matter:
10
Main content:
148
Illustrations:
7
Coloured Illustrations:
35
Tables:
26
Keywords for this book
Machine Learning; Deep Learning; Neuronal Networks; Cybersecurity; IT-Security.
Audience(s) for this book
Researchers, Graduate Students, Professionals and CTOs
Safety & product resources
-
Manufacturer information:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com