Machine Learning in Cyber Trust: Security, Privacy, and Reliability
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2009
|
Ausgabe: | 1st ed. 2009 |
Schlagworte: | |
Online-Zugang: | DE-355 URL des Erstveröffentlichers |
Beschreibung: | 1 Online-Ressource (XVI, 362 Seiten 100 illus.) |
ISBN: | 9780387887357 |
DOI: | 10.1007/978-0-387-88735-7 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV050122726 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 250115s2009 xx o|||| 00||| eng d | ||
020 | |a 9780387887357 |9 978-0-387-88735-7 | ||
024 | 7 | |a 10.1007/978-0-387-88735-7 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-387-88735-7 | ||
035 | |a (DE-599)BVBBV050122726 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Machine Learning in Cyber Trust |b Security, Privacy, and Reliability |c edited by Jeffrey J. P. Tsai, Philip S. Yu |
250 | |a 1st ed. 2009 | ||
264 | 1 | |a New York, NY |b Springer US |c 2009 | |
300 | |a 1 Online-Ressource (XVI, 362 Seiten 100 illus.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms. This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work. | |
505 | 8 | |a Specific features include the following: A survey of various approaches using machine learning/data mining techniques to enhance the traditional security mechanisms of databases A discussion of detection of SQL Injection attacks and anomaly detection for defending against insider threats An approach to detecting anomalies in a graph-based representation of the data collected during the monitoring of cyber and other infrastructures An empirical study of seven online-learning methods on the task of detecting malicious executables A novel network intrusion detection framework for mining and detecting sequential intrusion patterns A solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems An image encryption algorithm based on a chaotic cellular neural network to deal with information security and assurance An overview of data privacy research, examining the achievements, | |
505 | 8 | |a challenges and opportunities while pinpointing individual research efforts on the grand map of data privacy protection An algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data An approach for assessing the reliability of SOA-based systems using AI reasoning techniques The models, properties, and applications of context-aware Web services, including an ontology-based context model to enable formal description and acquisition of contextual information pertaining to service requestors and services Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Data Mining and Knowledge Discovery | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data mining | |
650 | 4 | |a Artificial intelligence | |
700 | 1 | |a Tsai, Jeffrey J. P. |4 edt | |
700 | 1 | |a Yu, Philip S. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387887340 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387889504 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781441946980 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-0-387-88735-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-SCS | ||
940 | 1 | |q ZDB-2-SCS_2009 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035459596 | |
966 | e | |u https://doi.org/10.1007/978-0-387-88735-7 |l DE-355 |p ZDB-2-SCS |q UBR Paketkauf 2024 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1821312683267325952 |
---|---|
adam_text | |
any_adam_object | |
author2 | Tsai, Jeffrey J. P. Yu, Philip S. |
author2_role | edt edt |
author2_variant | j j p t jjp jjpt p s y ps psy |
author_facet | Tsai, Jeffrey J. P. Yu, Philip S. |
building | Verbundindex |
bvnumber | BV050122726 |
collection | ZDB-1-SCS |
contents | Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms. This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work. Specific features include the following: A survey of various approaches using machine learning/data mining techniques to enhance the traditional security mechanisms of databases A discussion of detection of SQL Injection attacks and anomaly detection for defending against insider threats An approach to detecting anomalies in a graph-based representation of the data collected during the monitoring of cyber and other infrastructures An empirical study of seven online-learning methods on the task of detecting malicious executables A novel network intrusion detection framework for mining and detecting sequential intrusion patterns A solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems An image encryption algorithm based on a chaotic cellular neural network to deal with information security and assurance An overview of data privacy research, examining the achievements, challenges and opportunities while pinpointing individual research efforts on the grand map of data privacy protection An algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data An approach for assessing the reliability of SOA-based systems using AI reasoning techniques The models, properties, and applications of context-aware Web services, including an ontology-based context model to enable formal description and acquisition of contextual information pertaining to service requestors and services Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks |
ctrlnum | (ZDB-2-SCS)978-0-387-88735-7 (DE-599)BVBBV050122726 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-0-387-88735-7 |
edition | 1st ed. 2009 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV050122726</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">250115s2009 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387887357</subfield><subfield code="9">978-0-387-88735-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-0-387-88735-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-387-88735-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050122726</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Machine Learning in Cyber Trust</subfield><subfield code="b">Security, Privacy, and Reliability</subfield><subfield code="c">edited by Jeffrey J. P. Tsai, Philip S. Yu</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2009</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 362 Seiten 100 illus.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms. This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Specific features include the following: A survey of various approaches using machine learning/data mining techniques to enhance the traditional security mechanisms of databases A discussion of detection of SQL Injection attacks and anomaly detection for defending against insider threats An approach to detecting anomalies in a graph-based representation of the data collected during the monitoring of cyber and other infrastructures An empirical study of seven online-learning methods on the task of detecting malicious executables A novel network intrusion detection framework for mining and detecting sequential intrusion patterns A solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems An image encryption algorithm based on a chaotic cellular neural network to deal with information security and assurance An overview of data privacy research, examining the achievements,</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">challenges and opportunities while pinpointing individual research efforts on the grand map of data privacy protection An algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data An approach for assessing the reliability of SOA-based systems using AI reasoning techniques The models, properties, and applications of context-aware Web services, including an ontology-based context model to enable formal description and acquisition of contextual information pertaining to service requestors and services Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining and Knowledge Discovery</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsai, Jeffrey J. P.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yu, Philip S.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387887340</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387889504</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781441946980</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-0-387-88735-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2009</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035459596</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-88735-7</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">UBR Paketkauf 2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV050122726 |
illustrated | Not Illustrated |
indexdate | 2025-01-15T11:05:28Z |
institution | BVB |
isbn | 9780387887357 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035459596 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVI, 362 Seiten 100 illus.) |
psigel | ZDB-1-SCS ZDB-2-SCS_2009 ZDB-2-SCS UBR Paketkauf 2024 |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer US |
record_format | marc |
spelling | Machine Learning in Cyber Trust Security, Privacy, and Reliability edited by Jeffrey J. P. Tsai, Philip S. Yu 1st ed. 2009 New York, NY Springer US 2009 1 Online-Ressource (XVI, 362 Seiten 100 illus.) txt rdacontent c rdamedia cr rdacarrier Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms. This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work. Specific features include the following: A survey of various approaches using machine learning/data mining techniques to enhance the traditional security mechanisms of databases A discussion of detection of SQL Injection attacks and anomaly detection for defending against insider threats An approach to detecting anomalies in a graph-based representation of the data collected during the monitoring of cyber and other infrastructures An empirical study of seven online-learning methods on the task of detecting malicious executables A novel network intrusion detection framework for mining and detecting sequential intrusion patterns A solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems An image encryption algorithm based on a chaotic cellular neural network to deal with information security and assurance An overview of data privacy research, examining the achievements, challenges and opportunities while pinpointing individual research efforts on the grand map of data privacy protection An algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data An approach for assessing the reliability of SOA-based systems using AI reasoning techniques The models, properties, and applications of context-aware Web services, including an ontology-based context model to enable formal description and acquisition of contextual information pertaining to service requestors and services Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks Data and Information Security Data Mining and Knowledge Discovery Artificial Intelligence Data protection Data mining Artificial intelligence Tsai, Jeffrey J. P. edt Yu, Philip S. edt Erscheint auch als Druck-Ausgabe 9780387887340 Erscheint auch als Druck-Ausgabe 9780387889504 Erscheint auch als Druck-Ausgabe 9781441946980 https://doi.org/10.1007/978-0-387-88735-7 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Machine Learning in Cyber Trust Security, Privacy, and Reliability Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms. This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work. Specific features include the following: A survey of various approaches using machine learning/data mining techniques to enhance the traditional security mechanisms of databases A discussion of detection of SQL Injection attacks and anomaly detection for defending against insider threats An approach to detecting anomalies in a graph-based representation of the data collected during the monitoring of cyber and other infrastructures An empirical study of seven online-learning methods on the task of detecting malicious executables A novel network intrusion detection framework for mining and detecting sequential intrusion patterns A solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems An image encryption algorithm based on a chaotic cellular neural network to deal with information security and assurance An overview of data privacy research, examining the achievements, challenges and opportunities while pinpointing individual research efforts on the grand map of data privacy protection An algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data An approach for assessing the reliability of SOA-based systems using AI reasoning techniques The models, properties, and applications of context-aware Web services, including an ontology-based context model to enable formal description and acquisition of contextual information pertaining to service requestors and services Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks Data and Information Security Data Mining and Knowledge Discovery Artificial Intelligence Data protection Data mining Artificial intelligence |
title | Machine Learning in Cyber Trust Security, Privacy, and Reliability |
title_auth | Machine Learning in Cyber Trust Security, Privacy, and Reliability |
title_exact_search | Machine Learning in Cyber Trust Security, Privacy, and Reliability |
title_full | Machine Learning in Cyber Trust Security, Privacy, and Reliability edited by Jeffrey J. P. Tsai, Philip S. Yu |
title_fullStr | Machine Learning in Cyber Trust Security, Privacy, and Reliability edited by Jeffrey J. P. Tsai, Philip S. Yu |
title_full_unstemmed | Machine Learning in Cyber Trust Security, Privacy, and Reliability edited by Jeffrey J. P. Tsai, Philip S. Yu |
title_short | Machine Learning in Cyber Trust |
title_sort | machine learning in cyber trust security privacy and reliability |
title_sub | Security, Privacy, and Reliability |
topic | Data and Information Security Data Mining and Knowledge Discovery Artificial Intelligence Data protection Data mining Artificial intelligence |
topic_facet | Data and Information Security Data Mining and Knowledge Discovery Artificial Intelligence Data protection Data mining Artificial intelligence |
url | https://doi.org/10.1007/978-0-387-88735-7 |
work_keys_str_mv | AT tsaijeffreyjp machinelearningincybertrustsecurityprivacyandreliability AT yuphilips machinelearningincybertrustsecurityprivacyandreliability |