Machine Learning Techniques for Cybersecurity (Record no. 86255)

000 -LEADER
fixed length control field 05192nam a22006855i 4500
001 - CONTROL NUMBER
control field 978-3-031-28259-1
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730165328.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230408s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031282591
-- 978-3-031-28259-1
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Bertino, Elisa.
245 10 - TITLE STATEMENT
Title Machine Learning Techniques for Cybersecurity
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XII, 165 p. 37 illus., 30 illus. in color.
490 1# - SERIES STATEMENT
Series statement Synthesis Lectures on Information Security, Privacy, and Trust,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Background on Machine Learning Techniques -- Security Policy earning -- Software Security Analysis -- Hardware Security Analysis -- Detection -- Attack Management -- Case Studies -- Main Challenges in the Use of ML for Security -- Concluding Remarks.
520 ## - SUMMARY, ETC.
Summary, etc This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.
700 1# - AUTHOR 2
Author 2 Bhardwaj, Sonam.
700 1# - AUTHOR 2
Author 2 Cicala, Fabrizio.
700 1# - AUTHOR 2
Author 2 Gong, Sishuai.
700 1# - AUTHOR 2
Author 2 Karim, Imtiaz.
700 1# - AUTHOR 2
Author 2 Katsis, Charalampos.
700 1# - AUTHOR 2
Author 2 Lee, Hyunwoo.
700 1# - AUTHOR 2
Author 2 Li, Adrian Shuai.
700 1# - AUTHOR 2
Author 2 Mahgoub, Ashraf Y.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-28259-1
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
100 1# - AUTHOR NAME
-- (orcid)
-- 0000-0002-4029-7051
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2023.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Machine learning.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer crimes.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Software engineering.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial Intelligence.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Machine Learning.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cybercrime.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Software Engineering.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1945-9750
912 ## -
-- ZDB-2-SXSC

No items available.