Machine learning for cyber security:
This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses to...
Gespeichert in:
Weitere beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Berlin ; Boston
De Gruyter
[2022]
|
Schriftenreihe: | De Gruyter series on the applications of mathematics in engineering and information sciences
volume 15 |
Schlagwörter: | |
Links: | https://doi.org/10.1515/9783110766745 https://doi.org/10.1515/9783110766745 https://doi.org/10.1515/9783110766745 https://doi.org/10.1515/9783110766745 https://doi.org/10.1515/9783110766745?locatt=mode:legacy https://doi.org/10.1515/9783110766745 https://doi.org/10.1515/9783110766745 https://doi.org/10.1515/9783110766745 https://doi.org/10.1515/9783110766745 https://doi.org/10.1515/9783110766745 https://doi.org/10.1515/9783110766745 |
Zusammenfassung: | This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools. |
Umfang: | 1 Online-Ressource (X, 148 Seiten) Illustrationen |
ISBN: | 9783110766745 9783110766769 |
DOI: | 10.1515/9783110766745 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV048608036 | ||
003 | DE-604 | ||
005 | 20241111 | ||
007 | cr|uuu---uuuuu | ||
008 | 221213s2022 xx a||| o|||| 00||| eng d | ||
020 | |a 9783110766745 |9 978-3-11-076674-5 | ||
020 | |a 9783110766769 |9 978-3-11-076676-9 | ||
024 | 7 | |a 10.1515/9783110766745 |2 doi | |
035 | |a (ZDB-23-DGG)9783110766745 | ||
035 | |a (OCoLC)1355305304 | ||
035 | |a (DE-599)BVBBV048608036 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1043 |a DE-1046 |a DE-858 |a DE-859 |a DE-860 |a DE-739 |a DE-91 |a DE-573 |a DE-898 |a DE-706 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
084 | |a TEC 000 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Machine learning for cyber security |c edited by Preeti Malik, Lata Nautiyal and Mangey Ram |
264 | 1 | |a Berlin ; Boston |b De Gruyter |c [2022] | |
264 | 4 | |c © 2023 | |
300 | |a 1 Online-Ressource (X, 148 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a De Gruyter series on the applications of mathematics in engineering and information sciences |v volume 15 | |
520 | |a This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools. | ||
650 | 4 | |a IT-Sicherheit | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Maschinelles Lernen | |
650 | 4 | |a Neuronale Netze | |
700 | 1 | |a Malik, Preeti |0 (DE-588)1231822384 |4 edt | |
700 | 1 | |a Nautiyal, Lata |d ca. 20. / 21. Jhr. |0 (DE-588)1281976784 |4 edt | |
700 | 1 | |a Ram, Mangey |d 1980- |0 (DE-588)1144926335 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-11-076673-8 |
830 | 0 | |a De Gruyter series on the applications of mathematics in engineering and information sciences |v volume 15 |w (DE-604)BV047361200 |9 15 | |
856 | 4 | 0 | |u https://doi.org/10.1515/9783110766745 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG | ||
912 | |a ZDB-23-DEI | ||
940 | 1 | |q ZDB-23-DEI16 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033983459 | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-1043 |p ZDB-23-DGG |q FAB_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-1046 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-858 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-573 |p ZDB-23-DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745?locatt=mode:legacy |l DE-898 |p ZDB-23-DEI |q ZDB-23-DEI16 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-859 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-860 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-91 |p ZDB-23-DEI |q TUM_Paketkauf_2022 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-706 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-739 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2746783 |
---|---|
_version_ | 1824442145604370432 |
adam_text | |
any_adam_object | |
author2 | Malik, Preeti Nautiyal, Lata ca. 20. / 21. Jhr Ram, Mangey 1980- |
author2_role | edt edt edt |
author2_variant | p m pm l n ln m r mr |
author_GND | (DE-588)1231822384 (DE-588)1281976784 (DE-588)1144926335 |
author_facet | Malik, Preeti Nautiyal, Lata ca. 20. / 21. Jhr Ram, Mangey 1980- |
building | Verbundindex |
bvnumber | BV048608036 |
classification_rvk | ST 277 ST 300 |
classification_tum | TEC 000 DAT 000 |
collection | ZDB-23-DGG ZDB-23-DEI |
ctrlnum | (ZDB-23-DGG)9783110766745 (OCoLC)1355305304 (DE-599)BVBBV048608036 |
discipline | Technik Informatik |
doi_str_mv | 10.1515/9783110766745 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV048608036</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241111</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">221213s2022 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110766745</subfield><subfield code="9">978-3-11-076674-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110766769</subfield><subfield code="9">978-3-11-076676-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110766745</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9783110766745</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1355305304</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048608036</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">TEC 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Machine learning for cyber security</subfield><subfield code="c">edited by Preeti Malik, Lata Nautiyal and Mangey Ram</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Boston</subfield><subfield code="b">De Gruyter</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 148 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">De Gruyter series on the applications of mathematics in engineering and information sciences</subfield><subfield code="v">volume 15</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT-Sicherheit</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Maschinelles Lernen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Neuronale Netze</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Malik, Preeti</subfield><subfield code="0">(DE-588)1231822384</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nautiyal, Lata</subfield><subfield code="d">ca. 20. / 21. Jhr.</subfield><subfield code="0">(DE-588)1281976784</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ram, Mangey</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1144926335</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-11-076673-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">De Gruyter series on the applications of mathematics in engineering and information sciences</subfield><subfield code="v">volume 15</subfield><subfield code="w">(DE-604)BV047361200</subfield><subfield code="9">15</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-23-DEI16</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033983459</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-858</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745?locatt=mode:legacy</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">ZDB-23-DEI16</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">TUM_Paketkauf_2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048608036 |
illustrated | Illustrated |
indexdate | 2025-02-18T21:08:00Z |
institution | BVB |
isbn | 9783110766745 9783110766769 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033983459 |
oclc_num | 1355305304 |
open_access_boolean | |
owner | DE-1043 DE-1046 DE-858 DE-859 DE-860 DE-739 DE-91 DE-BY-TUM DE-573 DE-898 DE-BY-UBR DE-706 |
owner_facet | DE-1043 DE-1046 DE-858 DE-859 DE-860 DE-739 DE-91 DE-BY-TUM DE-573 DE-898 DE-BY-UBR DE-706 |
physical | 1 Online-Ressource (X, 148 Seiten) Illustrationen |
psigel | ZDB-23-DGG ZDB-23-DEI ZDB-23-DEI16 ZDB-23-DGG FAB_PDA_DGG ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FCO_PDA_DGG ZDB-23-DEI ZDB-23-DEI16 ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DEI TUM_Paketkauf_2022 ZDB-23-DGG UPA_PDA_DGG |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | De Gruyter |
record_format | marc |
series | De Gruyter series on the applications of mathematics in engineering and information sciences |
series2 | De Gruyter series on the applications of mathematics in engineering and information sciences |
spellingShingle | Machine learning for cyber security De Gruyter series on the applications of mathematics in engineering and information sciences IT-Sicherheit Künstliche Intelligenz Maschinelles Lernen Neuronale Netze |
title | Machine learning for cyber security |
title_auth | Machine learning for cyber security |
title_exact_search | Machine learning for cyber security |
title_full | Machine learning for cyber security edited by Preeti Malik, Lata Nautiyal and Mangey Ram |
title_fullStr | Machine learning for cyber security edited by Preeti Malik, Lata Nautiyal and Mangey Ram |
title_full_unstemmed | Machine learning for cyber security edited by Preeti Malik, Lata Nautiyal and Mangey Ram |
title_short | Machine learning for cyber security |
title_sort | machine learning for cyber security |
topic | IT-Sicherheit Künstliche Intelligenz Maschinelles Lernen Neuronale Netze |
topic_facet | IT-Sicherheit Künstliche Intelligenz Maschinelles Lernen Neuronale Netze |
url | https://doi.org/10.1515/9783110766745 |
volume_link | (DE-604)BV047361200 |
work_keys_str_mv | AT malikpreeti machinelearningforcybersecurity AT nautiyallata machinelearningforcybersecurity AT rammangey machinelearningforcybersecurity |