๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Machine Learning and Data Mining for Computer Security: Methods and Applications (Advanced Information and Knowledge Processing)

โœ Scribed by Marcus A. Maloof


Year
2005
Tongue
English
Leaves
225
Edition
1st Edition.
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security. The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables. This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.


๐Ÿ“œ SIMILAR VOLUMES


Machine Learning and Data Mining for Com
โœ Marcus A. Maloof (auth.), Marcus A. Maloof BS, MS, PhD (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer-Verlag London ๐ŸŒ English

<p><P>The Internet began as a private network connecting government, military, and academic researchers. As such, there was little need for secure protocols, encrypted packets, and hardened servers. When the creation of the World Wide Web unexpectedly ushered in the age of the commercial Internet, t

Machine Learning and Data Mining for Com
โœ Marcus A. Maloof ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer sec

Data Mining with Computational Intellige
โœ Lipo Wang ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐ŸŒ English

Finding information hidden in data is as theoretically difficult as it is practically important. With the objective of discovering unknown patterns from data, the methodologies of data mining were derived from statistics, machine learning, and artificial intelligence, and are being used successfully

Data Mining with Computational Intellige
โœ Lipo Wang, Xiuju Fu ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

<p><span>Finding information hidden in data is as theoretically difficult as it is practically important. With the objective of discovering unknown patterns from data, the methodologies of data mining were derived from statistics, machine learning, and artificial intelligence, and are being used suc

Machine Learning for Audio, Image and Vi
โœ Francesco Camastra, Alessandro Vinciarelli ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Springer ๐ŸŒ English

This book is divided into three parts: From Perception to Computation - Shows how the physical supports our auditory and visual perceptions. In other words, it shows how acoustic waves and electromagnetic radiation are converted into objects that can be manipulated by a computer. Machine Learning