HOME > Detail View

Detail View

Introduction to machine learning with applications in information security

Introduction to machine learning with applications in information security

Material type
단행본
Personal Author
Title Statement
Introduction to machine learning with applications in information security / Mark Stamp, San Jose State University, California.
Publication, Distribution, etc
Boca Raton : CRC Press, Taylor & Francis Group, c2018.
Physical Medium
xiv, 345 p. ; 25 cm.
Series Statement
Chapman & Hall/CRC machine learning & pattern recognition ;16
ISBN
9781138626782 (hardback : acid-free paper)
Bibliography, Etc. Note
Includes bibliographical references (p. 319-337) and index.
Subject Added Entry-Topical Term
Information networks --Security measures. Machine learning.
000 00000cam u2200205 a 4500
001 000045945659
005 20180702174146
008 180628s2018 flu b 001 0 eng d
010 ▼a 2017023471
020 ▼a 9781138626782 (hardback : acid-free paper)
035 ▼a (KERIS)REF000018461794
040 ▼a DLC ▼b eng ▼c DLC ▼e rda ▼d DLC ▼d 211009
050 0 0 ▼a TK5105.59 ▼b .S735 2018
082 0 0 ▼a 004.6 ▼2 23
084 ▼a 004.6 ▼2 DDCK
090 ▼a 004.6 ▼b S7832i
100 1 ▼a Stamp, Mark.
245 1 0 ▼a Introduction to machine learning with applications in information security / ▼c Mark Stamp, San Jose State University, California.
260 ▼a Boca Raton : ▼b CRC Press, Taylor & Francis Group, ▼c c2018.
300 ▼a xiv, 345 p. ; ▼c 25 cm.
490 1 ▼a Chapman & Hall/CRC machine learning & pattern recognition ; ▼v 16
504 ▼a Includes bibliographical references (p. 319-337) and index.
650 0 ▼a Information networks ▼x Security measures.
650 0 ▼a Machine learning.
830 0 ▼a Chapman & Hall/CRC machine learning & pattern recognition ; ▼v 16.
945 ▼a KLPA

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 004.6 S7832i Accession No. 121245134 Availability Available Due Date Make a Reservation Service B M

Contents information

Author Introduction

마크 스탬프(지은이)

Texas Tech University에서 수학 석사 및 박사학위를 취득하였다. 현재 실리콘밸리에 있는 산호세 주립대 전산학과 교수로 정보보안을 강의하고 있다. 정보보안 관련 기업과 학계에서 풍부한 실무 경험을 쌓았으며, 미 국가보안국(NSA)에서 암호분석가로 7년간 근무하였다. stamp@cs.sjsu.edu

Information Provided By: : Aladin

Table of Contents

Introduction

What is Machine Learning? ?

About This Book?

Necessary Background

A Few Too Many Notes

I TOOLS OF THE TRADE

A Revealing Introduction to Hidden Markov Models

Introduction and Background

A Simple Example

Notation

The Three Problems

The Three Solutions

Dynamic Programming ?

Scaling?

All Together Now

The Bottom Line?

A Full Frontal View of Profile Hidden Markov Models?

Introduction

Overview and Notation

Pairwise Alignment

Multiple Sequence Alignment

PHMM from MSA

Scoring

The Bottom Line

Principal Components of Principal Component Analysis

Introduction?

Background

Principal Component Analysis ?

SVD Basics ?

All Together Now

A Numerical Example ?

The Bottom Line?

A Reassuring Introduction to Support Vector Machines

Introduction?

Constrained Optimization

AC loser Look at SVM

All Together Now?

A Note on Quadratic Programming?

The Bottom Line?

Problems ?

A Comprehensible Collection of Clustering Concepts

Introduction

Overview and Background

-Means

Measuring Cluster Quality

EM Clustering

The Bottom Line

Problems

Many Mini Topics

Introduction

-Nearest Neighbors

Neural Networks

Boosting

Random Forest

Linear Discriminant Analysis

VectorQuantization

Naive Bayes

Regression Analysis

Conditional Random Fields

Data Analysis

Introduction

Experimental Design

Accuracy

ROC Curves

Imbalance Problem

PR Curves

The Bottom Line

II APPLICATIONS

HMM Applications

Introduction

English Text Analysis ?

Detecting "Undetectable" Malware?

Classic Cryptanalysis

PHMM Applications

Introduction

Masquerade Detection

Malware Detection

PCA Applications

Introduction

Eigenfaces

Eigenviruses

Eigenspam

SVM Applications

Introduction

Malware Detection

Image Spam Revisited

Clustering Applications

Introduction

-Means for Malware Classification

EM vs -Means for Malware Analysis


Information Provided By: : Aladin

New Arrivals Books in Related Fields

정재화 (2020)