Machine Learning Techniques for Cybersecurity:
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2023
Cham Springer |
Ausgabe: | 1st ed. 2023 |
Schriftenreihe: | Synthesis Lectures on Information Security, Privacy, and Trust
|
Schlagworte: | |
Online-Zugang: | FAB01 FHA01 FHI01 FHN01 FKE01 UBT01 Volltext |
Beschreibung: | 1 Online-Ressource (XII, 165 p. 37 illus., 30 illus. in color) |
ISBN: | 9783031282591 |
ISSN: | 1945-9750 |
DOI: | 10.1007/978-3-031-28259-1 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV048918926 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230502s2023 |||| o||u| ||||||eng d | ||
020 | |a 9783031282591 |c Online |9 978-3-031-28259-1 | ||
024 | 7 | |a 10.1007/978-3-031-28259-1 |2 doi | |
035 | |a (ZDB-2-SXSC)9783031282591 | ||
035 | |a (OCoLC)1378489089 | ||
035 | |a (DE-599)BVBBV048918926 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1043 |a DE-Aug4 |a DE-92 |a DE-573 |a DE-859 |a DE-703 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Bertino, Elisa |e Verfasser |4 aut | |
245 | 1 | 0 | |a Machine Learning Techniques for Cybersecurity |c by Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub |
250 | |a 1st ed. 2023 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2023 | |
264 | 1 | |a Cham |b Springer | |
300 | |a 1 Online-Ressource (XII, 165 p. 37 illus., 30 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Synthesis Lectures on Information Security, Privacy, and Trust |x 1945-9750 | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Machine Learning | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Data protection | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Machine learning | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Software engineering | |
700 | 1 | |a Bhardwaj, Sonam |4 aut | |
700 | 1 | |a Cicala, Fabrizio |4 aut | |
700 | 1 | |a Gong, Sishuai |4 aut | |
700 | 1 | |a Karim, Imtiaz |4 aut | |
700 | 1 | |a Katsis, Charalampos |4 aut | |
700 | 1 | |a Lee, Hyunwoo |4 aut | |
700 | 1 | |a Li, Adrian Shuai |4 aut | |
700 | 1 | |a Mahgoub, Ashraf Y. |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-28258-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-28260-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-28261-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-28259-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SXSC | ||
940 | 1 | |q ZDB-2-SXSC_2023 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034183017 | ||
966 | e | |u https://doi.org/10.1007/978-3-031-28259-1 |l FAB01 |p ZDB-2-SXSC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-28259-1 |l FHA01 |p ZDB-2-SXSC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-28259-1 |l FHI01 |p ZDB-2-SXSC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-28259-1 |l FHN01 |p ZDB-2-SXSC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-28259-1 |l FKE01 |p ZDB-2-SXSC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-28259-1 |l UBT01 |p ZDB-2-SXSC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804185097852682240 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Bertino, Elisa Bhardwaj, Sonam Cicala, Fabrizio Gong, Sishuai Karim, Imtiaz Katsis, Charalampos Lee, Hyunwoo Li, Adrian Shuai Mahgoub, Ashraf Y. |
author_facet | Bertino, Elisa Bhardwaj, Sonam Cicala, Fabrizio Gong, Sishuai Karim, Imtiaz Katsis, Charalampos Lee, Hyunwoo Li, Adrian Shuai Mahgoub, Ashraf Y. |
author_role | aut aut aut aut aut aut aut aut aut |
author_sort | Bertino, Elisa |
author_variant | e b eb s b sb f c fc s g sg i k ik c k ck h l hl a s l as asl a y m ay aym |
building | Verbundindex |
bvnumber | BV048918926 |
collection | ZDB-2-SXSC |
ctrlnum | (ZDB-2-SXSC)9783031282591 (OCoLC)1378489089 (DE-599)BVBBV048918926 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-031-28259-1 |
edition | 1st ed. 2023 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02830nmm a2200685zcb4500</leader><controlfield tag="001">BV048918926</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230502s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031282591</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-28259-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-28259-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SXSC)9783031282591</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1378489089</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048918926</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bertino, Elisa</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Machine Learning Techniques for Cybersecurity</subfield><subfield code="c">by Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 165 p. 37 illus., 30 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Synthesis Lectures on Information Security, Privacy, and Trust</subfield><subfield code="x">1945-9750</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine Learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhardwaj, Sonam</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cicala, Fabrizio</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gong, Sishuai</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karim, Imtiaz</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katsis, Charalampos</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lee, Hyunwoo</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Adrian Shuai</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mahgoub, Ashraf Y.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-28258-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-28260-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-28261-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-28259-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SXSC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SXSC_2023</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034183017</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-28259-1</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-SXSC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-28259-1</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SXSC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-28259-1</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SXSC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-28259-1</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SXSC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-28259-1</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SXSC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-28259-1</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SXSC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048918926 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:55:12Z |
indexdate | 2024-07-10T09:49:49Z |
institution | BVB |
isbn | 9783031282591 |
issn | 1945-9750 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034183017 |
oclc_num | 1378489089 |
open_access_boolean | |
owner | DE-1043 DE-Aug4 DE-92 DE-573 DE-859 DE-703 |
owner_facet | DE-1043 DE-Aug4 DE-92 DE-573 DE-859 DE-703 |
physical | 1 Online-Ressource (XII, 165 p. 37 illus., 30 illus. in color) |
psigel | ZDB-2-SXSC ZDB-2-SXSC_2023 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer International Publishing Springer |
record_format | marc |
series2 | Synthesis Lectures on Information Security, Privacy, and Trust |
spelling | Bertino, Elisa Verfasser aut Machine Learning Techniques for Cybersecurity by Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub 1st ed. 2023 Cham Springer International Publishing 2023 Cham Springer 1 Online-Ressource (XII, 165 p. 37 illus., 30 illus. in color) txt rdacontent c rdamedia cr rdacarrier Synthesis Lectures on Information Security, Privacy, and Trust 1945-9750 Data and Information Security Artificial Intelligence Machine Learning Cybercrime Software Engineering Data protection Artificial intelligence Machine learning Computer crimes Software engineering Bhardwaj, Sonam aut Cicala, Fabrizio aut Gong, Sishuai aut Karim, Imtiaz aut Katsis, Charalampos aut Lee, Hyunwoo aut Li, Adrian Shuai aut Mahgoub, Ashraf Y. aut Erscheint auch als Druck-Ausgabe 978-3-031-28258-4 Erscheint auch als Druck-Ausgabe 978-3-031-28260-7 Erscheint auch als Druck-Ausgabe 978-3-031-28261-4 https://doi.org/10.1007/978-3-031-28259-1 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Bertino, Elisa Bhardwaj, Sonam Cicala, Fabrizio Gong, Sishuai Karim, Imtiaz Katsis, Charalampos Lee, Hyunwoo Li, Adrian Shuai Mahgoub, Ashraf Y. Machine Learning Techniques for Cybersecurity Data and Information Security Artificial Intelligence Machine Learning Cybercrime Software Engineering Data protection Artificial intelligence Machine learning Computer crimes Software engineering |
title | Machine Learning Techniques for Cybersecurity |
title_auth | Machine Learning Techniques for Cybersecurity |
title_exact_search | Machine Learning Techniques for Cybersecurity |
title_exact_search_txtP | Machine Learning Techniques for Cybersecurity |
title_full | Machine Learning Techniques for Cybersecurity by Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub |
title_fullStr | Machine Learning Techniques for Cybersecurity by Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub |
title_full_unstemmed | Machine Learning Techniques for Cybersecurity by Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub |
title_short | Machine Learning Techniques for Cybersecurity |
title_sort | machine learning techniques for cybersecurity |
topic | Data and Information Security Artificial Intelligence Machine Learning Cybercrime Software Engineering Data protection Artificial intelligence Machine learning Computer crimes Software engineering |
topic_facet | Data and Information Security Artificial Intelligence Machine Learning Cybercrime Software Engineering Data protection Artificial intelligence Machine learning Computer crimes Software engineering |
url | https://doi.org/10.1007/978-3-031-28259-1 |
work_keys_str_mv | AT bertinoelisa machinelearningtechniquesforcybersecurity AT bhardwajsonam machinelearningtechniquesforcybersecurity AT cicalafabrizio machinelearningtechniquesforcybersecurity AT gongsishuai machinelearningtechniquesforcybersecurity AT karimimtiaz machinelearningtechniquesforcybersecurity AT katsischaralampos machinelearningtechniquesforcybersecurity AT leehyunwoo machinelearningtechniquesforcybersecurity AT liadrianshuai machinelearningtechniquesforcybersecurity AT mahgoubashrafy machinelearningtechniquesforcybersecurity |