ECU Libraries Catalog
Librarian View
LEADER 09311cam 2200817Ii 4500
001
on1084727081
003
OCoLC
005
20191108113237.0
006
m o d
007
cr cnu|||unuuu
008
190207t20192019flu ob 001 0 eng d
020
a| 9780429504044
q| (electronic bk.)
020
a| 0429504047
q| (electronic bk.)
020
a| 9780429995729
q| (electronic bk. ;
q| PDF)
020
a| 0429995725
q| (electronic bk. ;
q| PDF)
020
a| 9780429995712
q| (electronic bk. ;
q| EPUB)
020
a| 0429995717
q| (electronic bk. ;
q| EPUB)
020
a| 9780429995705
q| (electronic bk. ;
q| Mobipocket)
020
a| 0429995709
q| (electronic bk. ;
q| Mobipocket)
020
z| 9781138587304
035
a| (Sirsi) o1084727081
035
a| (OCoLC)1084727081
040
a| N$T
b| eng
e| rda
e| pn
c| N$T
d| N$T
d| EBLCP
d| COO
d| OCLCF
d| TYFRS
d| UKAHL
d| OCLCQ
d| ERE
d| UtOrBLW
049
a| EREE
050
4
a| TK5105.59 .M334 2019eb
072
7
a| COM
x| 000000
2| bisacsh
072
7
a| COM
x| 021030
2| bisacsh
072
7
a| COM
x| 037000
2| bisacsh
072
7
a| MAT
x| 004000
2| bisacsh
072
7
a| UY
2| bicssc
082
0
4
a| 006.3/1
2| 23
245
0
0
a| Machine learning for computer and cyber security :
b| principles, algorithms, and practices /
c| editors, Brij B. Gupta, Michael Sheng.
264
1
a| Boca Raton :
b| CRC Press,
c| [2019]
264
4
c| ©2019
300
a| 1 online resource
336
a| text
b| txt
2| rdacontent
337
a| computer
b| c
2| rdamedia
338
a| online resource
b| cr
2| rdacarrier
504
a| Includes bibliographical references and index.
588
0
a| Vendor-supplied metadata.
505
0
a| Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
505
8
a| 7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls; 8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
505
8
a| 12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network; 13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index
520
a| While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.
545
0
a| Brij B. Gupta received PhD degree from Indian Institute of Technology Roorkee, India in Information and Cyber Security. He published more than 175 research papers in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, Inderscience, etc. He has visited several countries, i.e. Canada, Japan, Malaysia, Australia, China, Hong-Kong, Italy, Spain etc to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. Dr. Gupta also received Young Faculty research fellowship award from Ministry of Electronics and Information Technology, Government of India in 2017. He is also working as principal investigator of various R&D projects. He is serving as associate editor of IEEE Access, IEEE TII, and Executive editor of IJITCA, Inderscience, respectively. At present, Dr. Gupta is working as Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes Information security, Cyber Security, Mobile security, Cloud Computing, Web security, Intrusion detection and Phishing. Michael Sheng is a full Professor and Head of Department of Computing at Macquarie University. Before moving to Macquarie, Michael spent 10 years at School of Computer Science, the University of Adelaide (UoA). Michael holds a PhD degree in computer science from the University of New South Wales (UNSW) and did his post-doc as a research scientist at CSIRO ICT Centre. From 1999 to 2001, Sheng also worked at UNSW as a visiting research fellow. Prior to that, he spent 6 years as a senior software engineer in industries. Prof. Sheng has more than 280 publications as edited books and proceedings, refereed book chapters, and refereed technical papers in journals and conferences including ACM Computing Surveys, ACM TOIT, ACM TOMM, ACM TKDD, VLDB Journal, Computer (Oxford), IEEE TPDS, TKDE, DAPD, IEEE TSC, WWWJ, IEEE Computer, IEEE Internet Computing, Communications of the ACM, VLDB, ICDE, ICDM, CIKM, EDBT, WWW, ICSE, ICSOC, ICWS, and CAiSE. Dr. Michael Sheng is the recipient of the ARC Future Fellowship (2014), Chris Wallace Award for Outstanding Research Contribution (2012), and Microsoft Research Fellowship (2003). He is a member of the IEEE and the ACM. Homepage: https://web.science.mq.edu.au/~qsheng
650
0
a| Computer networks
x| Security measures
x| Data processing.
=| ^A388828
650
0
a| Computer security
x| Data processing.
=| ^A257308
650
0
a| Machine learning.
=| ^A145211
650
0
a| Artificial intelligence.
=| ^A15394
650
7
a| COMPUTERS
x| General.
2| bisacsh
650
7
a| COMPUTERS
x| Database Management
x| Data Mining.
2| bisacsh
650
7
a| COMPUTERS
x| Machine Theory.
2| bisacsh
650
7
a| MATHEMATICS
x| Arithmetic.
2| bisacsh
650
7
a| Artificial intelligence.
2| fast
0| (OCoLC)fst00817247
650
7
a| Machine learning.
2| fast
0| (OCoLC)fst01004795
655
4
a| Electronic books.
700
1
a| Gupta, Brij,
d| 1982-
e| editor.
=| ^A1387306
700
1
a| Sheng, Quan Z.,
e| editor.
=| ^A1387170
856
4
0
3| ProQuest Ebook Central
u| https://ebookcentral.proquest.com/lib/eastcarolina/detail.action?docID=5675759
938
a| Askews and Holts Library Services
b| ASKH
n| AH35392632
938
a| ProQuest Ebook Central
b| EBLB
n| EBL5675759
938
a| EBSCOhost
b| EBSC
n| 2023478
949
a| Click on web address
w| asis
h| joyner211
o| jwjh
949
a| Click on web address
w| asis
h| hsl104
o| jwjh
949
a| Click on web address
w| asis
h| jmusic66
o| jwjh
994
a| C0
b| ERE
596
a| 1 3 4
998
a| 5201388
999
a| CLICK ON WEB ADDRESS
w| ASIS
c| 1
i| 5201388-1001
l| JNET
m| JOYNER
r| Y
s| Y
t| JNEYBPDDAO
u| 11/8/2019
x| EBOOK
z| JERESOURCE
o| .STAFF. jwjh
999
a| CLICK ON WEB ADDRESS
w| ASIS
c| 1
i| 5201388-2001
l| HSLELEC
m| HSL
r| Y
s| Y
t| HYBPDDAO
u| 11/8/2019
x| EBOOK
z| HERESOURCE
o| .STAFF. jwjh
999
a| CLICK ON WEB ADDRESS
w| ASIS
c| 1
i| 5201388-3001
l| MNET
m| JMUSIC
r| Y
s| Y
t| MNEYBPDDAO
u| 11/8/2019
x| EBOOK
z| JERESOURCE
o| .STAFF. jwjh