𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Intrusion Detection: A Machine Learning Approach

✍ Scribed by Zhenwei Yu, Jeffrey J P Tsai


Publisher
Imperial College Press
Year
2011
Tongue
English
Leaves
185
Series
Series in Electrical and Computer Engineering 3
Edition
3rd
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (Ids), and presents the architecture and implementation of Ids. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various Ids via simulation will also be included.

✦ Subjects


Computer Science AI Machine Learning Bioinformatics Simulation Cybernetics Human Interaction Information Theory Robotics Systems Analysis Design Computers Technology Software Development Testing Engineering Programming Security Encryption Cryptography Hacking Network Privacy Online Safety Certifications Viruses


πŸ“œ SIMILAR VOLUMES


Network Intrusion Detection using Deep L
✍ Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja πŸ“‚ Library πŸ“… 2018 πŸ› Springer Singapore 🌐 English

<p><p>This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in ID

A Machine-Learning Approach to Phishing
✍ O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi πŸ“‚ Library πŸ“… 2014 πŸ› Syngress 🌐 English

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers,Β and user logins and passwords, as well as other information entered via a web site. The authors of <b><i>A Machine-Learning Approach to Phishi

A Machine-Learning Approach to Phishing
✍ I.S. Amiri, O.A. Akanbi, E. Fazeldehkordi πŸ“‚ Library πŸ“… 2014 πŸ› Syngress 🌐 English

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of <b><i>A Machine-Learning Approach to Phishi

Machine Learning Approaches to Non-Intru
✍ Roberto Bonfigli, Stefano Squartini πŸ“‚ Library πŸ“… 2020 πŸ› Springer International Publishing 🌐 English

<p>Research on Smart Grids has recently focused on the energy monitoring issue, with the objective of maximizing the user consumption awareness in building contexts on the one hand, and providing utilities with a detailed description of customer habits on the other. In particular, <b>Non-Intrusive L

Intrusion Detection: A Data Mining Appro
✍ Nandita Sengupta, Jaya Sil πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncert

SCADA Security: Machine Learning Concept
✍ Abdulmohsen Almalawi; Zahir Tari; Adil Fahad; Xun Yi πŸ“‚ Library πŸ“… 2020 πŸ› John Wiley & Sons 🌐 English

Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process