HOME > Detail View

Detail View

Machine learning in cyber trust : security, privacy, and reliability

Machine learning in cyber trust : security, privacy, and reliability (Loan 4 times)

Material type
단행본
Personal Author
Tsai, Jeffrey J.-P. Yu, Philip S.
Title Statement
Machine learning in cyber trust : security, privacy, and reliability / edited by Jeffrey J.P. Tsai, Philip S. Yu.
Publication, Distribution, etc
New York ;   London :   Springer ,   2009.  
Physical Medium
xvi, 362 p. : ill. ; 25 cm.
ISBN
9780387887340 (hbk.) 0387887342 (hbk.)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Machine learning. Cyberterrorism -- Prevention. Computer security.
000 00901namuu2200265 a 4500
001 000045531898
005 20090623112844
008 090622s2009 nyua b 001 0 eng d
015 ▼a GBA8E1155 ▼2 bnb
020 ▼a 9780387887340 (hbk.)
020 ▼a 0387887342 (hbk.)
040 ▼a StDuBDS ▼b eng ▼c StDuBDS ▼d 211009
082 0 4 ▼a 006.31 ▼2 22
090 ▼a 006.31 ▼b M1493
245 0 0 ▼a Machine learning in cyber trust : ▼b security, privacy, and reliability / ▼c edited by Jeffrey J.P. Tsai, Philip S. Yu.
260 ▼a New York ; ▼a London : ▼b Springer , ▼c 2009.
300 ▼a xvi, 362 p. : ▼b ill. ; ▼c 25 cm.
504 ▼a Includes bibliographical references and index.
650 0 ▼a Machine learning.
650 0 ▼a Cyberterrorism ▼x Prevention.
650 0 ▼a Computer security.
700 1 ▼a Tsai, Jeffrey J.-P.
700 1 ▼a Yu, Philip S.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 006.31 M1493 Accession No. 121184048 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Cyber System.- Cyber-Physical Systems: A New Frontier.- Security.- Misleading Learners: Co-opting Your Spam Filter.- Survey of Machine Learning Methods for Database Security.- Identifying Threats Using Graph-based Anomaly Detection.- On the Performance of Online Learning Methods for Detecting Malicious Executables.- Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems.- A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features.- Image Encryption and Chaotic Cellular Neural Network.- Privacy.- From Data Privacy to Location Privacy.- Privacy Preserving Nearest Neighbor Search.- Reliability.- High-Confidence Compositional Reliability Assessment of SOA-Based Systems Using Machine Learning Techniques.- Model, Properties, and Applications of Context-Aware Web Services.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

Harrison, Matt (2021)
데이터분석과인공지능활용편찬위원회 (2021)
Stevens, Eli (2020)