Handbook of research on machine learning techniques for pattern recognition and information security:
"This book examines the impact of machine learning techniques on pattern recognition and information security" - Provided by publisher
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Publisher of Timely Knowledge
[2021]
|
Schriftenreihe: | A volume in the Advances in computational intelligence and robotics (ACIR) book series
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-573 DE-898 DE-1049 DE-91 DE-706 DE-706 DE-83 Volltext Chapter PDFs via platform |
Zusammenfassung: | "This book examines the impact of machine learning techniques on pattern recognition and information security" - Provided by publisher |
Beschreibung: | 1 Online-Ressource (xxiv, 355 Seiten) Illustrationen |
ISBN: | 9781799833017 |
ISSN: | 2327-042X |
DOI: | 10.4018/978-1-7998-3299-7 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV047326814 | ||
003 | DE-604 | ||
005 | 20220330 | ||
007 | cr|uuu---uuuuu | ||
008 | 210615s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781799833017 |c Online |9 978-1-7998-3301-7 | ||
024 | 7 | |a 10.4018/978-1-7998-3299-7 |2 doi | |
035 | |a (ZDB-98-IGB)978-1-7998-3301-7 | ||
035 | |a (OCoLC)1257812139 | ||
035 | |a (DE-599)BVBBV047326814 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1049 |a DE-898 |a DE-91 |a DE-706 |a DE-1050 |a DE-573 |a DE-83 | ||
245 | 1 | 0 | |a Handbook of research on machine learning techniques for pattern recognition and information security |c Mohit Dua (National Institute of Technology, Kurukshetra, India), Ankit Kumar Jain (National Institute of Technology, Kurukshetra, India) |
246 | 1 | 3 | |a Machine learning techniques for pattern recognition and information security |
264 | 1 | |a Hershey PA, USA |b IGI Global, Publisher of Timely Knowledge |c [2021] | |
264 | 4 | |c © 2021 | |
300 | |a 1 Online-Ressource (xxiv, 355 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a A volume in the Advances in computational intelligence and robotics (ACIR) book series |x 2327-042X | |
505 | 8 | |a Chapter 1. Intelligent vision-based systems for public safety and protection via machine learning techniques -- Chapter 2. Comparative analysis of various soft computing technique-based automatic licence plate recognition systems -- Chapter 3. Impact of syntactical and statistical pattern recognition on prognostic reasoning -- Chapter 4. Challenges and issues in plant disease detection using deep learning -- Chapter 5. Automatic animal detection and collision avoidance system (ADCAS) using thermal camera -- Chapter 6. Distracted driver detection system using deep learning technique -- Chapter 7. Application of deep learning model convolution neural network for effective web information retrieval -- Chapter 8. Cosine transformed chaos function and block scrambling-based image encryption -- Chapter 9. An improved approach for multiple image encryption using alternate multidimensional chaos and Lorenz attractor -- Chapter 10. Simple linear iterative clustering (SLIC) and graph theory-based image segmentation -- Chapter 11. COVID-19 detection using chest x-ray and transfer learning -- Chapter 12. COVID-19-related predictions using NER on news headlines -- Chapter 13. Security issues in fog computing and ML-based solutions -- Chapter 14. Intrusion detection systems: current trends and future challenges -- Chapter 15. Vulnerability assessment and malware analysis of android apps using machine learning -- Chapter 16. Locally-adaptive naïve bayes framework design via density-based clustering for large scale datasets -- Chapter 17. RFID security issues, defenses, and security schemes | |
520 | 3 | |a "This book examines the impact of machine learning techniques on pattern recognition and information security" - Provided by publisher | |
653 | 0 | |a Database security | |
653 | 0 | |a Machine learning | |
653 | 0 | |a Pattern recognition systems | |
653 | 0 | |a Database security | |
653 | 0 | |a Machine learning | |
653 | 0 | |a Pattern recognition systems | |
700 | 1 | |a Dua, Mohit |d 1982- |4 edt | |
700 | 1 | |a Jain, Ankit Kumar |d 1986- |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-7998-3299-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-7998-3299-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Softcover |z 978-1-7998-3300-0 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-3299-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 1 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7 |3 Chapter PDFs via platform |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/241185 |l DE-898 |p ZDB-1-IGE |q ZDB-1-IGE21 |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/241185 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE21 |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-3299-7 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079031287119872 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Dua, Mohit 1982- Jain, Ankit Kumar 1986- |
author2_role | edt edt |
author2_variant | m d md a k j ak akj |
author_facet | Dua, Mohit 1982- Jain, Ankit Kumar 1986- |
building | Verbundindex |
bvnumber | BV047326814 |
collection | ZDB-1-IGE ZDB-98-IGB |
contents | Chapter 1. Intelligent vision-based systems for public safety and protection via machine learning techniques -- Chapter 2. Comparative analysis of various soft computing technique-based automatic licence plate recognition systems -- Chapter 3. Impact of syntactical and statistical pattern recognition on prognostic reasoning -- Chapter 4. Challenges and issues in plant disease detection using deep learning -- Chapter 5. Automatic animal detection and collision avoidance system (ADCAS) using thermal camera -- Chapter 6. Distracted driver detection system using deep learning technique -- Chapter 7. Application of deep learning model convolution neural network for effective web information retrieval -- Chapter 8. Cosine transformed chaos function and block scrambling-based image encryption -- Chapter 9. An improved approach for multiple image encryption using alternate multidimensional chaos and Lorenz attractor -- Chapter 10. Simple linear iterative clustering (SLIC) and graph theory-based image segmentation -- Chapter 11. COVID-19 detection using chest x-ray and transfer learning -- Chapter 12. COVID-19-related predictions using NER on news headlines -- Chapter 13. Security issues in fog computing and ML-based solutions -- Chapter 14. Intrusion detection systems: current trends and future challenges -- Chapter 15. Vulnerability assessment and malware analysis of android apps using machine learning -- Chapter 16. Locally-adaptive naïve bayes framework design via density-based clustering for large scale datasets -- Chapter 17. RFID security issues, defenses, and security schemes |
ctrlnum | (ZDB-98-IGB)978-1-7998-3301-7 (OCoLC)1257812139 (DE-599)BVBBV047326814 |
doi_str_mv | 10.4018/978-1-7998-3299-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV047326814</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220330</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210615s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799833017</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-7998-3301-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-3299-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)978-1-7998-3301-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1257812139</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047326814</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of research on machine learning techniques for pattern recognition and information security</subfield><subfield code="c">Mohit Dua (National Institute of Technology, Kurukshetra, India), Ankit Kumar Jain (National Institute of Technology, Kurukshetra, India)</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Machine learning techniques for pattern recognition and information security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Publisher of Timely Knowledge</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 355 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">A volume in the Advances in computational intelligence and robotics (ACIR) book series</subfield><subfield code="x">2327-042X</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 1. Intelligent vision-based systems for public safety and protection via machine learning techniques -- Chapter 2. Comparative analysis of various soft computing technique-based automatic licence plate recognition systems -- Chapter 3. Impact of syntactical and statistical pattern recognition on prognostic reasoning -- Chapter 4. Challenges and issues in plant disease detection using deep learning -- Chapter 5. Automatic animal detection and collision avoidance system (ADCAS) using thermal camera -- Chapter 6. Distracted driver detection system using deep learning technique -- Chapter 7. Application of deep learning model convolution neural network for effective web information retrieval -- Chapter 8. Cosine transformed chaos function and block scrambling-based image encryption -- Chapter 9. An improved approach for multiple image encryption using alternate multidimensional chaos and Lorenz attractor -- Chapter 10. Simple linear iterative clustering (SLIC) and graph theory-based image segmentation -- Chapter 11. COVID-19 detection using chest x-ray and transfer learning -- Chapter 12. COVID-19-related predictions using NER on news headlines -- Chapter 13. Security issues in fog computing and ML-based solutions -- Chapter 14. Intrusion detection systems: current trends and future challenges -- Chapter 15. Vulnerability assessment and malware analysis of android apps using machine learning -- Chapter 16. Locally-adaptive naïve bayes framework design via density-based clustering for large scale datasets -- Chapter 17. RFID security issues, defenses, and security schemes</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book examines the impact of machine learning techniques on pattern recognition and information security" - Provided by publisher</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Database security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Machine learning</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Pattern recognition systems</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Database security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Machine learning</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Pattern recognition systems</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dua, Mohit</subfield><subfield code="d">1982-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jain, Ankit Kumar</subfield><subfield code="d">1986-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-7998-3299-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-7998-3299-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Softcover</subfield><subfield code="z">978-1-7998-3300-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-3299-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7</subfield><subfield code="3">Chapter PDFs via platform</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/241185</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/241185</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-3299-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047326814 |
illustrated | Not Illustrated |
index_date | 2024-07-03T17:31:21Z |
indexdate | 2024-07-20T06:38:31Z |
institution | BVB |
isbn | 9781799833017 |
issn | 2327-042X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032729423 |
oclc_num | 1257812139 |
open_access_boolean | |
owner | DE-1049 DE-898 DE-BY-UBR DE-91 DE-BY-TUM DE-706 DE-1050 DE-573 DE-83 |
owner_facet | DE-1049 DE-898 DE-BY-UBR DE-91 DE-BY-TUM DE-706 DE-1050 DE-573 DE-83 |
physical | 1 Online-Ressource (xxiv, 355 Seiten) Illustrationen |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-1-IGE ZDB-1-IGE21 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IGI Global, Publisher of Timely Knowledge |
record_format | marc |
series2 | A volume in the Advances in computational intelligence and robotics (ACIR) book series |
spelling | Handbook of research on machine learning techniques for pattern recognition and information security Mohit Dua (National Institute of Technology, Kurukshetra, India), Ankit Kumar Jain (National Institute of Technology, Kurukshetra, India) Machine learning techniques for pattern recognition and information security Hershey PA, USA IGI Global, Publisher of Timely Knowledge [2021] © 2021 1 Online-Ressource (xxiv, 355 Seiten) Illustrationen txt rdacontent c c rdamedia cr rdacarrier A volume in the Advances in computational intelligence and robotics (ACIR) book series 2327-042X Chapter 1. Intelligent vision-based systems for public safety and protection via machine learning techniques -- Chapter 2. Comparative analysis of various soft computing technique-based automatic licence plate recognition systems -- Chapter 3. Impact of syntactical and statistical pattern recognition on prognostic reasoning -- Chapter 4. Challenges and issues in plant disease detection using deep learning -- Chapter 5. Automatic animal detection and collision avoidance system (ADCAS) using thermal camera -- Chapter 6. Distracted driver detection system using deep learning technique -- Chapter 7. Application of deep learning model convolution neural network for effective web information retrieval -- Chapter 8. Cosine transformed chaos function and block scrambling-based image encryption -- Chapter 9. An improved approach for multiple image encryption using alternate multidimensional chaos and Lorenz attractor -- Chapter 10. Simple linear iterative clustering (SLIC) and graph theory-based image segmentation -- Chapter 11. COVID-19 detection using chest x-ray and transfer learning -- Chapter 12. COVID-19-related predictions using NER on news headlines -- Chapter 13. Security issues in fog computing and ML-based solutions -- Chapter 14. Intrusion detection systems: current trends and future challenges -- Chapter 15. Vulnerability assessment and malware analysis of android apps using machine learning -- Chapter 16. Locally-adaptive naïve bayes framework design via density-based clustering for large scale datasets -- Chapter 17. RFID security issues, defenses, and security schemes "This book examines the impact of machine learning techniques on pattern recognition and information security" - Provided by publisher Database security Machine learning Pattern recognition systems Dua, Mohit 1982- edt Jain, Ankit Kumar 1986- edt Erscheint auch als Druck-Ausgabe 978-1-7998-3299-7 Erscheint auch als Druck-Ausgabe 1-7998-3299-6 Erscheint auch als Druck-Ausgabe, Softcover 978-1-7998-3300-0 https://doi.org/10.4018/978-1-7998-3299-7 Verlag URL des Erstveröffentlichers Volltext http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7 Chapter PDFs via platform |
spellingShingle | Handbook of research on machine learning techniques for pattern recognition and information security Chapter 1. Intelligent vision-based systems for public safety and protection via machine learning techniques -- Chapter 2. Comparative analysis of various soft computing technique-based automatic licence plate recognition systems -- Chapter 3. Impact of syntactical and statistical pattern recognition on prognostic reasoning -- Chapter 4. Challenges and issues in plant disease detection using deep learning -- Chapter 5. Automatic animal detection and collision avoidance system (ADCAS) using thermal camera -- Chapter 6. Distracted driver detection system using deep learning technique -- Chapter 7. Application of deep learning model convolution neural network for effective web information retrieval -- Chapter 8. Cosine transformed chaos function and block scrambling-based image encryption -- Chapter 9. An improved approach for multiple image encryption using alternate multidimensional chaos and Lorenz attractor -- Chapter 10. Simple linear iterative clustering (SLIC) and graph theory-based image segmentation -- Chapter 11. COVID-19 detection using chest x-ray and transfer learning -- Chapter 12. COVID-19-related predictions using NER on news headlines -- Chapter 13. Security issues in fog computing and ML-based solutions -- Chapter 14. Intrusion detection systems: current trends and future challenges -- Chapter 15. Vulnerability assessment and malware analysis of android apps using machine learning -- Chapter 16. Locally-adaptive naïve bayes framework design via density-based clustering for large scale datasets -- Chapter 17. RFID security issues, defenses, and security schemes |
title | Handbook of research on machine learning techniques for pattern recognition and information security |
title_alt | Machine learning techniques for pattern recognition and information security |
title_auth | Handbook of research on machine learning techniques for pattern recognition and information security |
title_exact_search | Handbook of research on machine learning techniques for pattern recognition and information security |
title_exact_search_txtP | Handbook of research on machine learning techniques for pattern recognition and information security |
title_full | Handbook of research on machine learning techniques for pattern recognition and information security Mohit Dua (National Institute of Technology, Kurukshetra, India), Ankit Kumar Jain (National Institute of Technology, Kurukshetra, India) |
title_fullStr | Handbook of research on machine learning techniques for pattern recognition and information security Mohit Dua (National Institute of Technology, Kurukshetra, India), Ankit Kumar Jain (National Institute of Technology, Kurukshetra, India) |
title_full_unstemmed | Handbook of research on machine learning techniques for pattern recognition and information security Mohit Dua (National Institute of Technology, Kurukshetra, India), Ankit Kumar Jain (National Institute of Technology, Kurukshetra, India) |
title_short | Handbook of research on machine learning techniques for pattern recognition and information security |
title_sort | handbook of research on machine learning techniques for pattern recognition and information security |
url | https://doi.org/10.4018/978-1-7998-3299-7 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3299-7 |
work_keys_str_mv | AT duamohit handbookofresearchonmachinelearningtechniquesforpatternrecognitionandinformationsecurity AT jainankitkumar handbookofresearchonmachinelearningtechniquesforpatternrecognitionandinformationsecurity AT duamohit machinelearningtechniquesforpatternrecognitionandinformationsecurity AT jainankitkumar machinelearningtechniquesforpatternrecognitionandinformationsecurity |