Machine learning for cyber security:
This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses to...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Boston
De Gruyter
[2022]
|
Schriftenreihe: | De Gruyter series on the applications of mathematics in engineering and information sciences
volume 15 |
Schlagworte: | |
Online-Zugang: | DE-1043 DE-1046 DE-858 DE-573 DE-898 DE-859 DE-860 DE-863 DE-862 DE-91 DE-706 DE-739 Volltext |
Zusammenfassung: | This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools. |
Beschreibung: | 1 Online-Ressource (X, 148 Seiten) Illustrationen |
ISBN: | 9783110766745 9783110766769 |
DOI: | 10.1515/9783110766745 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV048608036 | ||
003 | DE-604 | ||
005 | 20250325 | ||
007 | cr|uuu---uuuuu | ||
008 | 221213s2022 xx a||| o|||| 00||| eng d | ||
020 | |a 9783110766745 |c Online, pdf |9 978-3-11-076674-5 | ||
020 | |a 9783110766769 |c Online, epub |9 978-3-11-076676-9 | ||
024 | 7 | |a 10.1515/9783110766745 |2 doi | |
035 | |a (ZDB-23-DGG)9783110766745 | ||
035 | |a (OCoLC)1355305304 | ||
035 | |a (DE-599)BVBBV048608036 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1043 |a DE-1046 |a DE-858 |a DE-859 |a DE-860 |a DE-739 |a DE-91 |a DE-573 |a DE-898 |a DE-706 |a DE-863 |a DE-862 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
084 | |a TEC 000 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Machine learning for cyber security |c edited by Preeti Malik, Lata Nautiyal and Mangey Ram |
264 | 1 | |a Berlin ; Boston |b De Gruyter |c [2022] | |
264 | 4 | |c © 2023 | |
300 | |a 1 Online-Ressource (X, 148 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a De Gruyter series on the applications of mathematics in engineering and information sciences |v volume 15 | |
520 | |a This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools. | ||
650 | 4 | |a IT-Sicherheit | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Maschinelles Lernen | |
650 | 4 | |a Neuronale Netze | |
650 | 0 | 7 | |a Deep Learning |0 (DE-588)1135597375 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Neuronales Netz |0 (DE-588)4226127-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Maschinelles Lernen |0 (DE-588)4193754-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Maschinelles Lernen |0 (DE-588)4193754-5 |D s |
689 | 0 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Deep Learning |0 (DE-588)1135597375 |D s |
689 | 0 | 4 | |a Neuronales Netz |0 (DE-588)4226127-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Malik, Preeti |0 (DE-588)1231822384 |4 edt | |
700 | 1 | |a Nautiyal, Lata |d ca. 20. / 21. Jhr. |0 (DE-588)1281976784 |4 edt | |
700 | 1 | |a Ram, Mangey |d 1980- |0 (DE-588)1144926335 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-11-076673-8 |
830 | 0 | |a De Gruyter series on the applications of mathematics in engineering and information sciences |v volume 15 |w (DE-604)BV047361200 |9 15 | |
856 | 4 | 0 | |u https://doi.org/10.1515/9783110766745 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG | ||
912 | |a ZDB-23-DEI | ||
940 | 1 | |q ZDB-23-DEI16 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033983459 | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-1043 |p ZDB-23-DGG |q FAB_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-1046 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-858 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-573 |p ZDB-23-DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745?locatt=mode:legacy |l DE-898 |p ZDB-23-DEI |q ZDB-23-DEI16 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-859 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-860 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-863 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-862 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-91 |p ZDB-23-DEI |q TUM_Paketkauf_2022 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-706 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9783110766745 |l DE-739 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1827623962145718272 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Malik, Preeti Nautiyal, Lata ca. 20. / 21. Jhr Ram, Mangey 1980- |
author2_role | edt edt edt |
author2_variant | p m pm l n ln m r mr |
author_GND | (DE-588)1231822384 (DE-588)1281976784 (DE-588)1144926335 |
author_facet | Malik, Preeti Nautiyal, Lata ca. 20. / 21. Jhr Ram, Mangey 1980- |
building | Verbundindex |
bvnumber | BV048608036 |
classification_rvk | ST 277 ST 300 |
classification_tum | TEC 000 DAT 000 |
collection | ZDB-23-DGG ZDB-23-DEI |
ctrlnum | (ZDB-23-DGG)9783110766745 (OCoLC)1355305304 (DE-599)BVBBV048608036 |
discipline | Technik Informatik |
discipline_str_mv | Technik Informatik |
doi_str_mv | 10.1515/9783110766745 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV048608036</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250325</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">221213s2022 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110766745</subfield><subfield code="c">Online, pdf</subfield><subfield code="9">978-3-11-076674-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110766769</subfield><subfield code="c">Online, epub</subfield><subfield code="9">978-3-11-076676-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110766745</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9783110766745</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1355305304</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048608036</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">TEC 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Machine learning for cyber security</subfield><subfield code="c">edited by Preeti Malik, Lata Nautiyal and Mangey Ram</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Boston</subfield><subfield code="b">De Gruyter</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 148 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">De Gruyter series on the applications of mathematics in engineering and information sciences</subfield><subfield code="v">volume 15</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT-Sicherheit</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Maschinelles Lernen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Neuronale Netze</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Deep Learning</subfield><subfield code="0">(DE-588)1135597375</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Neuronales Netz</subfield><subfield code="0">(DE-588)4226127-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Maschinelles Lernen</subfield><subfield code="0">(DE-588)4193754-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Maschinelles Lernen</subfield><subfield code="0">(DE-588)4193754-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Deep Learning</subfield><subfield code="0">(DE-588)1135597375</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Neuronales Netz</subfield><subfield code="0">(DE-588)4226127-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Malik, Preeti</subfield><subfield code="0">(DE-588)1231822384</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nautiyal, Lata</subfield><subfield code="d">ca. 20. / 21. Jhr.</subfield><subfield code="0">(DE-588)1281976784</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ram, Mangey</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1144926335</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-11-076673-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">De Gruyter series on the applications of mathematics in engineering and information sciences</subfield><subfield code="v">volume 15</subfield><subfield code="w">(DE-604)BV047361200</subfield><subfield code="9">15</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-23-DEI16</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033983459</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-858</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745?locatt=mode:legacy</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">ZDB-23-DEI16</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">TUM_Paketkauf_2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9783110766745</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048608036 |
illustrated | Illustrated |
index_date | 2024-07-03T21:11:20Z |
indexdate | 2025-03-26T04:00:32Z |
institution | BVB |
isbn | 9783110766745 9783110766769 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033983459 |
oclc_num | 1355305304 |
open_access_boolean | |
owner | DE-1043 DE-1046 DE-858 DE-859 DE-860 DE-739 DE-91 DE-BY-TUM DE-573 DE-898 DE-BY-UBR DE-706 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
owner_facet | DE-1043 DE-1046 DE-858 DE-859 DE-860 DE-739 DE-91 DE-BY-TUM DE-573 DE-898 DE-BY-UBR DE-706 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (X, 148 Seiten) Illustrationen |
psigel | ZDB-23-DGG ZDB-23-DEI ZDB-23-DEI16 ZDB-23-DGG FAB_PDA_DGG ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FCO_PDA_DGG ZDB-23-DEI ZDB-23-DEI16 ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DEI TUM_Paketkauf_2022 ZDB-23-DGG UPA_PDA_DGG |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | De Gruyter |
record_format | marc |
series | De Gruyter series on the applications of mathematics in engineering and information sciences |
series2 | De Gruyter series on the applications of mathematics in engineering and information sciences |
spellingShingle | Machine learning for cyber security De Gruyter series on the applications of mathematics in engineering and information sciences IT-Sicherheit Künstliche Intelligenz Maschinelles Lernen Neuronale Netze Deep Learning (DE-588)1135597375 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Neuronales Netz (DE-588)4226127-2 gnd Computersicherheit (DE-588)4274324-2 gnd Maschinelles Lernen (DE-588)4193754-5 gnd |
subject_GND | (DE-588)1135597375 (DE-588)4293034-0 (DE-588)4226127-2 (DE-588)4274324-2 (DE-588)4193754-5 |
title | Machine learning for cyber security |
title_auth | Machine learning for cyber security |
title_exact_search | Machine learning for cyber security |
title_exact_search_txtP | Machine learning for cyber security |
title_full | Machine learning for cyber security edited by Preeti Malik, Lata Nautiyal and Mangey Ram |
title_fullStr | Machine learning for cyber security edited by Preeti Malik, Lata Nautiyal and Mangey Ram |
title_full_unstemmed | Machine learning for cyber security edited by Preeti Malik, Lata Nautiyal and Mangey Ram |
title_short | Machine learning for cyber security |
title_sort | machine learning for cyber security |
topic | IT-Sicherheit Künstliche Intelligenz Maschinelles Lernen Neuronale Netze Deep Learning (DE-588)1135597375 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Neuronales Netz (DE-588)4226127-2 gnd Computersicherheit (DE-588)4274324-2 gnd Maschinelles Lernen (DE-588)4193754-5 gnd |
topic_facet | IT-Sicherheit Künstliche Intelligenz Maschinelles Lernen Neuronale Netze Deep Learning Zugriffskontrolle Neuronales Netz Computersicherheit |
url | https://doi.org/10.1515/9783110766745 |
volume_link | (DE-604)BV047361200 |
work_keys_str_mv | AT malikpreeti machinelearningforcybersecurity AT nautiyallata machinelearningforcybersecurity AT rammangey machinelearningforcybersecurity |