𝔖 Scriptorium
✦   LIBER   ✦

📁

Machine Learning for Cybersecurity: Innovative Deep Learning Solutions (SpringerBriefs in Computer Science)

✍ Scribed by Marwan Omar


Publisher
Springer
Year
2022
Tongue
English
Leaves
54
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This SpringerBrief presents the underlying principles of machine learning and how to deploy various deep learning tools and techniques to tackle and solve certain challenges facing the cybersecurity industry.
By implementing innovative deep learning solutions, cybersecurity researchers, students and practitioners can analyze patterns and learn how to prevent cyber-attacks and respond to changing malware behavior.
The knowledge and tools introduced in this brief can also assist cybersecurity teams to become more proactive in preventing threats and responding to active attacks in real time. It can reduce the amount of time spent on routine tasks and enable organizations to use their resources more strategically. In short, the knowledge and techniques provided in this brief can help make cybersecurity simpler, more proactive, less expensive and far more effective
Advanced-level students in computer science studying machine learning with a cybersecurity focus will find this SpringerBrief useful as a study guide. Researchers and cybersecurity professionals focusing on the application of machine learning tools and techniques to the cybersecurity domain will also want to purchase this SpringerBrief.

✦ Table of Contents


Contents
Chapter 1: Application of Machine Learning (ML) to Address Cybersecurity Threats
1.1 Introduction
1.2 Methodological Approach
1.2.1 Review of Literature
1.3 Conclusion
References
Chapter 2: New Approach to Malware Detection Using Optimized Convolutional Neural Network
2.1 Introduction
2.1.1 Need for the Study
2.1.2 Major Contributions of the Study
2.2 Related Work
2.3 System Architecture
2.4 Methodology and Dataset
2.5 Empirical Results
2.5.1 Improving the Baseline Model
2.5.2 Finalizing Our Model and Making Predictions
2.6 Results Comparison with Previous Work
2.7 Conclusion
References
Chapter 3: Malware Anomaly Detection Using Local Outlier Factor Technique
3.1 Introduction
3.1.1 Malware Detection
3.1.2 Intrusion Detection Systems
3.1.3 Network-Based Intrusion Detection System
3.1.4 Advantages of Network-Based Intrusion Detection System
3.2 Related Works
3.3 Proposed Methodology
3.3.1 Local Outlier Factor
3.3.1.1 A Brief Understanding of the Local Outlier Factor Approach
3.3.1.2 Basic Working of Local Outlier Factor
3.3.1.3 Local Reachability Distance
3.4 Results and Discussion
3.5 Conclusion
References


📜 SIMILAR VOLUMES


Machine Learning for Cybersecurity: Inno
✍ Marwan Omar 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This SpringerBrief presents the underlying principles of machine learning and how to deploy various deep learning tools and techniques to tackle and solve certain challenges facing the cybersecurity industry.<br>By implementing innovative deep learning solutions, cybersecurity researchers, stu

Applications of Game Theory in Deep Lear
✍ Tanmoy Hazra, Kushal Anjaria, Aditi Bajpai, Akshara Kumari 📂 Library 📅 2024 🏛 Springer 🌐 English

<p><span>This book aims to unravel the complex tapestry that interweaves strategic decision-making models with the forefront of deep learning techniques. </span><span>Applications of Game Theory in Deep Learning</span><span> provides an extensive and insightful exploration of game theory in deep lea

Applications of Game Theory in Deep Lear
✍ Tanmoy Hazra, Kushal Anjaria, Aditi Bajpai, Akshara Kumari 📂 Library 📅 2024 🏛 Springer 🌐 English

<p><span>This book aims to unravel the complex tapestry that interweaves strategic decision-making models with the forefront of deep learning techniques. </span><span>Applications of Game Theory in Deep Learning</span><span> provides an extensive and insightful exploration of game theory in deep lea

Machine Learning and Deep Learning in Co
✍ Huixiao Hong 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book is a collection of machine learning and deep learning algorithms, methods, architectures, and software tools that have been developed and widely applied in predictive toxicology. It compiles a set of recent applications using state-of-the-art machine learning and deep learning techni

Machine Learning and Deep Learning in Co
✍ Huixiao Hong 📂 Library 📅 2023 🏛 Springer Nature 🌐 English

This book is a collection of machine learning and deep learning algorithms, methods, architectures, and software tools that have been developed and widely applied in predictive toxicology. It compiles a set of recent applications using state-of-the-art machine learning and deep learning techniques i

Machine Learning Modeling for IoUT Netwo
✍ Ahmad A. Aziz El-Banna, Kaishun Wu 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book discusses how machine learning and the Internet of Things (IoT) are playing a part in smart control of underwater environments, known as </span><span>Internet of Underwater</span><span> </span><span>Things</span><span> (IoUT). The authors first present seawater’s key physical variabl