Deep Learning Applications for Cyber Security

Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questio...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Alazab, Mamoun (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Tang, MingJian (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Advanced Sciences and Technologies for Security Applications,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04383nam a2200565 4500
001 978-3-030-13057-2
003 DE-He213
005 20200123091139.0
007 cr nn 008mamaa
008 190814s2019 gw | s |||| 0|eng d
020 |a 9783030130572  |9 978-3-030-13057-2 
024 7 |a 10.1007/978-3-030-13057-2  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.B45 
072 7 |a UN  |2 bicssc 
072 7 |a COM021000  |2 bisacsh 
072 7 |a UN  |2 thema 
082 0 4 |a 005.7  |2 23 
245 1 0 |a Deep Learning Applications for Cyber Security  |h [electronic resource] /  |c edited by Mamoun Alazab, MingJian Tang. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a XX, 246 p. 78 illus., 54 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
505 0 |a Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft -- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems -- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks -- Using Convolutional Neural Networks for Classifying Malicious Network Traffic -- DBD: Deep Learning DGA-based Botnet Detection -- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks -- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach -- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks -- Forensic Detection of Child Exploitation Material using Deep Learning -- Toward Detection of Child Exploitation Material: A Forensic Approach. 
520 |a Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points. . 
650 0 |a Big data. 
650 0 |a Computer crimes. 
650 0 |a Neural networks (Computer science) . 
650 0 |a Computer security. 
650 0 |a System safety. 
650 1 4 |a Big Data.  |0 http://scigraph.springernature.com/things/product-market-codes/I29120 
650 2 4 |a Cybercrime.  |0 http://scigraph.springernature.com/things/product-market-codes/1B7000 
650 2 4 |a Mathematical Models of Cognitive Processes and Neural Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/M13100 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Security Science and Technology.  |0 http://scigraph.springernature.com/things/product-market-codes/P31080 
700 1 |a Alazab, Mamoun.  |e editor.  |0 (orcid)0000-0002-1928-3704  |1 https://orcid.org/0000-0002-1928-3704  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Tang, MingJian.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783030130565 
776 0 8 |i Printed edition:  |z 9783030130589 
776 0 8 |i Printed edition:  |z 9783030130596 
830 0 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
856 4 0 |u https://doi.org/10.1007/978-3-030-13057-2  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)