Intrusion detection: a machine learning approach
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Imperial College Press ; Singapore ; Hackensack, NJ Distributed by World Scientific Pub. Co.
2011
|
Schriftenreihe: | Series in electrical and computer engineering
v. 3 |
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (xii, 171 pages) illustrations |
ISBN: | 9781848164482 1848164483 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045349306 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781848164482 |9 978-1-84816-448-2 | ||
020 | |a 1848164483 |9 1-84816-448-3 | ||
035 | |a (ZDB-4-ITC)ocn742590401 | ||
035 | |a (OCoLC)742590401 | ||
035 | |a (DE-599)BVBBV045349306 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Yu, Zhenwei |e Verfasser |4 aut | |
245 | 1 | 0 | |a Intrusion detection |b a machine learning approach |c Zhenwei Yu, Jeffrey J.P. Tsai |
264 | 1 | |a London |b Imperial College Press ; Singapore ; Hackensack, NJ |b Distributed by World Scientific Pub. Co. |c 2011 | |
300 | |a 1 online resource (xii, 171 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Series in electrical and computer engineering |v v. 3 | |
500 | |a Print version record | ||
505 | 8 | |a This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer networks |x Security measures |a Computer security | |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Tsai, Jeffrey J.-P. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Yu, Zhenwei |t Intrusion detection |d London : Imperial College Press, 2011 |z 9781848164475 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735959 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179173136138240 |
---|---|
any_adam_object | |
author | Yu, Zhenwei |
author_facet | Yu, Zhenwei |
author_role | aut |
author_sort | Yu, Zhenwei |
author_variant | z y zy |
building | Verbundindex |
bvnumber | BV045349306 |
classification_rvk | ST 277 |
collection | ZDB-4-ITC |
contents | This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included |
ctrlnum | (ZDB-4-ITC)ocn742590401 (OCoLC)742590401 (DE-599)BVBBV045349306 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02355nmm a2200481zcb4500</leader><controlfield tag="001">BV045349306</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781848164482</subfield><subfield code="9">978-1-84816-448-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1848164483</subfield><subfield code="9">1-84816-448-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn742590401</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)742590401</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349306</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yu, Zhenwei</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intrusion detection</subfield><subfield code="b">a machine learning approach</subfield><subfield code="c">Zhenwei Yu, Jeffrey J.P. Tsai</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Imperial College Press ; Singapore ; Hackensack, NJ</subfield><subfield code="b">Distributed by World Scientific Pub. Co.</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 171 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Series in electrical and computer engineering</subfield><subfield code="v">v. 3</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsai, Jeffrey J.-P.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Yu, Zhenwei</subfield><subfield code="t">Intrusion detection</subfield><subfield code="d">London : Imperial College Press, 2011</subfield><subfield code="z">9781848164475</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735959</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV045349306 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:39Z |
institution | BVB |
isbn | 9781848164482 1848164483 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735959 |
oclc_num | 742590401 |
open_access_boolean | |
physical | 1 online resource (xii, 171 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Imperial College Press ; Singapore ; Hackensack, NJ Distributed by World Scientific Pub. Co. |
record_format | marc |
series2 | Series in electrical and computer engineering |
spelling | Yu, Zhenwei Verfasser aut Intrusion detection a machine learning approach Zhenwei Yu, Jeffrey J.P. Tsai London Imperial College Press ; Singapore ; Hackensack, NJ Distributed by World Scientific Pub. Co. 2011 1 online resource (xii, 171 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Series in electrical and computer engineering v. 3 Print version record This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer networks Security measures Computer security Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 s 1\p DE-604 Tsai, Jeffrey J.-P. Sonstige oth Erscheint auch als Druck-Ausgabe Yu, Zhenwei Intrusion detection London : Imperial College Press, 2011 9781848164475 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Yu, Zhenwei Intrusion detection a machine learning approach This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer networks Security measures Computer security Eindringerkennung (DE-588)4706627-1 gnd |
subject_GND | (DE-588)4706627-1 |
title | Intrusion detection a machine learning approach |
title_auth | Intrusion detection a machine learning approach |
title_exact_search | Intrusion detection a machine learning approach |
title_full | Intrusion detection a machine learning approach Zhenwei Yu, Jeffrey J.P. Tsai |
title_fullStr | Intrusion detection a machine learning approach Zhenwei Yu, Jeffrey J.P. Tsai |
title_full_unstemmed | Intrusion detection a machine learning approach Zhenwei Yu, Jeffrey J.P. Tsai |
title_short | Intrusion detection |
title_sort | intrusion detection a machine learning approach |
title_sub | a machine learning approach |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer networks Security measures Computer security Eindringerkennung (DE-588)4706627-1 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer networks Security measures Computer security Eindringerkennung |
work_keys_str_mv | AT yuzhenwei intrusiondetectionamachinelearningapproach AT tsaijeffreyjp intrusiondetectionamachinelearningapproach |