Machine Learning for Computer and Cyber Security
eBook - ePub

Machine Learning for Computer and Cyber Security

Principle, Algorithms, and Practices

  1. 352 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Machine Learning for Computer and Cyber Security

Principle, Algorithms, and Practices

About this book

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques.

This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals.

Key Features:

  • This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security.
  • It showcases important security aspects and current trends in the field.
  • It provides an insight of the future research directions in the field.
  • Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Machine Learning for Computer and Cyber Security by Brij B. Gupta, Quan Z. Sheng, Brij B. Gupta,Quan Z. Sheng in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. Table of Contents
  6. Foreword
  7. Acknowledgement
  8. Series Preface
  9. Preface
  10. 1. A Deep Learning-based System for Network Cyber Threat Detection
  11. 2. Machine Learning for Phishing Detection and Mitigation
  12. 3. Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective
  13. 4. A Bio-inspired Approach to Cyber Security
  14. 5. Applications of a Model to Evaluate and Utilize Users’ Interactions in Online Social Networks
  15. 6. A Deep-dive on Machine Learning for Cyber Security Use Cases
  16. 7. A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls
  17. 8. Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection
  18. 9. A Taxonomy of Bitcoin Security Issues and Defense Mechanisms
  19. 10. Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture
  20. 11. Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
  21. 12. Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network
  22. 13. Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms
  23. 14. Importance of Providing Incentives and Economic Solutions in IT Security
  24. 15. Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application
  25. Index