<p><p>This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in ID
Intrusion Detection: A Machine Learning Approach
β Scribed by Zhenwei Yu, Jeffrey J P Tsai
- Publisher
- Imperial College Press
- Year
- 2011
- Tongue
- English
- Leaves
- 185
- Series
- Series in Electrical and Computer Engineering 3
- Edition
- 3rd
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (Ids), and presents the architecture and implementation of Ids. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various Ids via simulation will also be included.
β¦ Subjects
Computer Science AI Machine Learning Bioinformatics Simulation Cybernetics Human Interaction Information Theory Robotics Systems Analysis Design Computers Technology Software Development Testing Engineering Programming Security Encryption Cryptography Hacking Network Privacy Online Safety Certifications Viruses
π SIMILAR VOLUMES
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers,Β and user logins and passwords, as well as other information entered via a web site. The authors of <b><i>A Machine-Learning Approach to Phishi
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of <b><i>A Machine-Learning Approach to Phishi
<p>Research on Smart Grids has recently focused on the energy monitoring issue, with the objective of maximizing the user consumption awareness in building contexts on the one hand, and providing utilities with a detailed description of customer habits on the other. In particular, <b>Non-Intrusive L
This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncert
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process