Bookshelf
| can't find it |

| browse books |
books
 

| book details |

Machine Learning Techniques for Cybersecurity

By (author) Elisa Bertino, By (author) Sonam Bhardwaj, By (author) Fabrizio Cicala, By (author) Sishuai Gong, By (author) Imtiaz Karim, By (author) Charalampos Katsis, By (author) Hyunwoo Lee, By (author) Adrian Shuai Li, By (author) Ashraf Y. Mahgoub

| on special |

normal price: R 2,097.95

Price: R 1,992.95


| book description |

This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions.  While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.

| product details |



Normally shipped | Usually dispatched in 3 to 4 weeks as supplier is out of stock
Publisher | Springer International Publishing AG
Published date | 27 Apr 2024
Language |
Format | Paperback / softback
Pages | 165
Dimensions | 240 x 168 x 0mm (L x W x H)
Weight | 0g
ISBN | 978-3-0312-8261-4
Readership Age |
BISAC | computers / security


| other options |


| your trolley |

To view the items in your trolley please sign in.

| sign in |

| specials |

Free Your Mind: The new world of manipulation and how to resist it

Laura Dodsworth
Paperback / softback
384 pages
was: R 300.95
now: R 270.95
Available from overseas. Dispatched in aprox 4-8 weeks as local supplier is out of stock

The Instant Sunday Times Bestseller Learn how to recognise and resist the daily attempts to control and manipulate your mind.

The Thing at 52

Mr. Ross Montgomery
Hardback
40 pages
was: R 363.95
now: R 345.95
Usually dispatched in 3 to 4 weeks as supplier is out of stock

The Thing at 52 is a beautiful picture book about friendship, loneliness and learning how to say goodbye.

The Silent Patient: The record-breaking, multimillion copy Sunday Times bestselling thriller and TikTok sensation

Alex Michaelides
Paperback / softback
352 pages
was: R 280.95
now: R 252.95
Available from overseas. Dispatched in aprox 4-8 weeks as local supplier is out of stock

With film rights snapped up by an Oscar winning Hollywood production company, rights sold in a world record 43 territories, and rave blurbs from David Baldacci, Lee Child and A.