๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

A Deep Learning based Approach to Proactive and Reactive Enterprise Security

โœ Scribed by Sumit Chakraborty


Publisher
Business Analytics Research Lab India
Year
2015
Tongue
English
Leaves
12
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Abstract: This work presents the construction of a deep learning based algorithmic mechanism to ensure the security of an information system based on proactive and reactive approach. The basic building blocks of the mechanism are threat analytics, cryptographic solutions and adaptive secure multiparty computation. It is basically an attempt of the cross fertilization of algorithmic game theory and financial cryptography. It defines deep learning strategy for proactive and reactive security based on the properties of adaptive secure multi-party computation. This work also shows the application of the mechanism on reasoning two test cases: (a) enterprise security and (b) malicious learning system in adversarial setting. It analyzes the complexity of the mechanism in terms of computational cost and security intelligence. This study is expected to be useful for a defense research organization.
Keywords: Adaptive Secure multi-party computation, Financial cryptography, Proactive security, Reactive security, Deep learning, Enterprise security, Adversarial machine learning, Complexity analysis.

โœฆ Table of Contents


This work is organized as follows. Section 2 highlights the importance of adaptive secure multi-party computation in deep learning mechanism. It defines deep learning strategy of information system security based on proactive and reactive approaches. Section 3 outlines the algorithmic mechanism of deep learning in details in the context of analyzing two test cases: DLM-ES for enterprise security and DLMโ€“MLS for adversarial learning system. Section 4 shows the complexity analysis of deep learning mechanism from the perspective of computational cost and security intelligence. Section 5 concludes the work.

โœฆ Subjects


Adaptive Secure multi-party computation, Financial cryptography, Proactive security, Reactive security, Deep learning, Enterprise security, Adversarial machine learning


๐Ÿ“œ SIMILAR VOLUMES


Applied Deep Learning: A Case-Based Appr
โœ Umberto Michelucci ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Apress ๐ŸŒ English

Work with advanced topics in deep learning, such as optimization algorithms, hyper-parameter tuning, dropout, and error analysis as well as strategies to address typical problems encountered when training deep neural networks. You'll begin by studying the activation functions mostly with a single ne

Applied Deep Learning: A Case-Based Appr
โœ Umberto Michelucci ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Apress ๐ŸŒ English

<div><p>Work with advanced topics in deep learning, such as optimization algorithms, hyper-parameter tuning, dropout, and error analysis as well as strategies to address typical problems encountered when training deep neural networks. You'll begin by studying the activation functions mostly with a s

Applied Deep Learning: A Case-Based Appr
โœ Michelucci, Umberto ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Apress ๐ŸŒ English

Work with advanced topics in deep learning, such as optimization algorithms, hyper-parameter tuning, dropout, and error analysis as well as strategies to address typical problems encountered when training deep neural networks. You'll begin by studying the activation functions mostly with a single ne

Reactive Attachment Disorder: A Case-Bas
โœ Daniel F. Shreeve (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Springer-Verlag New York ๐ŸŒ English

<p><p>A childโ€™s close bond with mother, father, or guardian usually provides a foundation for trust in all future attachments. Children deprived of early and healthy dependencyโ€”who do not form normal attachment with their caregiversโ€”may later suffer from Reactive Attachment Disorder (RAD). This chil

Reactive Attachment Disorder: A Case-Bas
โœ Daniel F. Shreeve (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Springer-Verlag New York ๐ŸŒ English

<p><p>A childโ€™s close bond with mother, father, or guardian usually provides a foundation for trust in all future attachments. Children deprived of early and healthy dependencyโ€”who do not form normal attachment with their caregiversโ€”may later suffer from Reactive Attachment Disorder (RAD). This chil