000 | 05192nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-031-28259-1 | ||
003 | DE-He213 | ||
005 | 20240730165328.0 | ||
007 | cr nn 008mamaa | ||
008 | 230408s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031282591 _9978-3-031-28259-1 |
||
024 | 7 |
_a10.1007/978-3-031-28259-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aBertino, Elisa. _eauthor. _0(orcid) _10000-0002-4029-7051 _4aut _4http://id.loc.gov/vocabulary/relators/aut _988467 |
|
245 | 1 | 0 |
_aMachine Learning Techniques for Cybersecurity _h[electronic resource] / _cby Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXII, 165 p. 37 illus., 30 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aIntroduction -- Background on Machine Learning Techniques -- Security Policy earning -- Software Security Analysis -- Hardware Security Analysis -- Detection -- Attack Management -- Case Studies -- Main Challenges in the Use of ML for Security -- Concluding Remarks. | |
520 | _aThis book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aMachine learning. _91831 |
|
650 | 0 |
_aComputer crimes. _910774 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aMachine Learning. _91831 |
650 | 2 | 4 |
_aCybercrime. _933477 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
700 | 1 |
_aBhardwaj, Sonam. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _988472 |
|
700 | 1 |
_aCicala, Fabrizio. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _988474 |
|
700 | 1 |
_aGong, Sishuai. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _988476 |
|
700 | 1 |
_aKarim, Imtiaz. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _988478 |
|
700 | 1 |
_aKatsis, Charalampos. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _988479 |
|
700 | 1 |
_aLee, Hyunwoo. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _988481 |
|
700 | 1 |
_aLi, Adrian Shuai. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _988482 |
|
700 | 1 |
_aMahgoub, Ashraf Y. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _988484 |
|
710 | 2 |
_aSpringerLink (Online service) _988485 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031282584 |
776 | 0 | 8 |
_iPrinted edition: _z9783031282607 |
776 | 0 | 8 |
_iPrinted edition: _z9783031282614 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _988486 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-28259-1 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c86255 _d86255 |