Machine Learning Techniques in Masquerader Detection
Author: Alejandro Pasos
Publisher:
Published: 2004
Total Pages: 110
ISBN-13:
DOWNLOAD EBOOKRead and Download eBook Full
Author: Alejandro Pasos
Publisher:
Published: 2004
Total Pages: 110
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher: Newnes
Published: 2013-05-16
Total Pages: 551
ISBN-13: 0444538666
DOWNLOAD EBOOKStatistical learning and analysis techniques have become extremely important today, given the tremendous growth in the size of heterogeneous data collections and the ability to process it even from physically distant locations. Recent advances made in the field of machine learning provide a strong framework for robust learning from the diverse corpora and continue to impact a variety of research problems across multiple scientific disciplines. The aim of this handbook is to familiarize beginners as well as experts with some of the recent techniques in this field.The Handbook is divided in two sections: Theory and Applications, covering machine learning, data analytics, biometrics, document recognition and security. - Very relevant to current research challenges faced in various fields - Self-contained reference to machine learning - Emphasis on applications-oriented techniques
Author: Simon Parkinson
Publisher: Springer
Published: 2018-09-04
Total Pages: 381
ISBN-13: 3319926241
DOWNLOAD EBOOKThis professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.
Author: Plevris, Vagelis
Publisher: IGI Global
Published: 2023-06-05
Total Pages: 404
ISBN-13: 1668456443
DOWNLOAD EBOOKIn recent years, artificial intelligence (AI) has drawn significant attention with respect to its applications in several scientific fields, varying from big data handling to medical diagnosis. A tremendous transformation has taken place with the emerging application of AI. AI can provide a wide range of solutions to address many challenges in civil engineering. Artificial Intelligence and Machine Learning Techniques for Civil Engineering highlights the latest technologies and applications of AI in structural engineering, transportation engineering, geotechnical engineering, and more. It features a collection of innovative research on the methods and implementation of AI and machine learning in multiple facets of civil engineering. Covering topics such as damage inspection, safety risk management, and information modeling, this premier reference source is an essential resource for engineers, government officials, business leaders and executives, construction managers, students and faculty of higher education, librarians, researchers, and academicians.
Author: Ajith Abraham
Publisher: Springer Science & Business Media
Published: 2011-07-08
Total Pages: 744
ISBN-13: 3642227139
DOWNLOAD EBOOKThis volume is the second part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 72 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on database and information systems; distributed software development; human computer interaction and interface; ICT; internet and Web computing; mobile computing; multi agent systems; multimedia and video systems; parallel and distributed algorithms; security, trust and privacy.
Author: Robin Sommer
Publisher: Springer
Published: 2012-02-11
Total Pages: 407
ISBN-13: 3642236448
DOWNLOAD EBOOKThis book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
Author: Sanjay Misra
Publisher: Springer Nature
Published: 2021-02-13
Total Pages: 746
ISBN-13: 3030691438
DOWNLOAD EBOOKThis book constitutes revised selected papers from the Third International Conference on Information and Communication Technology and Applications, ICTA 2020, held in Minna, Nigeria, in November 2020. Due to the COVID-19 pandemic the conference was held online. The 67 full papers were carefully reviewed and selected from 234 submissions. The papers are organized in the topical sections on Artificial Intelligence, Big Data and Machine Learning; Information Security Privacy and Trust; Information Science and Technology.
Author: V. Rao Vemuri
Publisher: CRC Press
Published: 2005-11-21
Total Pages: 288
ISBN-13: 1420031228
DOWNLOAD EBOOKDivided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems relat
Author: Lei Wang
Publisher: Springer Nature
Published: 2022-11-17
Total Pages: 687
ISBN-13: 3031192087
DOWNLOAD EBOOKThe three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during November 24th-26th, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in cyber-physical systems including intelligent transportation systems and smart healthcare systems; security and privacy; topology control and coverage; energy-efficient algorithms, systems and protocol design
Author: V. S. Shankar Sriram
Publisher: Springer Nature
Published: 2019-11-15
Total Pages: 315
ISBN-13: 9811508712
DOWNLOAD EBOOKThis book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019. The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications.