Data Mining and Machine Learning in Cybersecurity (Record no. 1020)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02150nam a2200373Ia 4500 |
| 001 - CONTROL NUMBER | |
| control field | AUP0KE11810PDF |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | FlBoTFG |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20230515122024.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
| fixed length control field | m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | cr cn |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 110525s2011 flua ob 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780429063756 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)727798816 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | FlBoTFG |
| Transcribing agency | FlBoTFG |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Item number | D812 |
| 090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) | |
| Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) | QA76.9.D343 |
| Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) | D825 2011 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Dua, Sumeet and Du, Xian |
| 245 10 - TITLE STATEMENT | |
| Title | Data Mining and Machine Learning in Cybersecurity |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc. | Boca Raton : |
| Name of publisher, distributor, etc. | CRC Press, |
| Date of publication, distribution, etc. | c2011. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 256 p. : |
| Other physical details | 69 B/W ill. |
| 500 ## - GENERAL NOTE | |
| General note | An Auerbach book. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | 1. Introduction -- 2. Classical machine-learning paradigms for data mining -- 3. Supervised learning for misuse/signature detection -- 4. Machine learning for anomaly detection -- 5. Machine learning for hybrid detection -- 6. Machine learning for scan detection -- 7. Machine learning for profiling network traffic -- 8. Privacy-preserving data mining -- 9. Emerging challenges in cybersecurity. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Introducing basic concepts of machine learning and data mining methodologies for cyber security, this book provides a unified reference for specific machine learning solutions and cybersecurity problems. The authors focus on how to apply machine learning methodologies in cybersecurity, categorizing methods for detecting, scanning, profiling, intrusions, and anomalies. The text presents challenges and solutions in machine learning along with cybersecurity fundamentals. It also describes advanced problems in cybersecurity in the machine learning domain and examines privacy-preserving data mining methods as a proactive security solution-- |
| Assigning source | Provided by publisher. |
| 530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE | |
| Additional physical form available note | Also available in print edition. |
| 538 ## - SYSTEM DETAILS NOTE | |
| System details note | Mode of access: World Wide Web. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data mining. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Machine learning. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security. |
| 655 #7 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | Electronic books. |
| Source of term | lcsh |
| 776 1# - ADDITIONAL PHYSICAL FORM ENTRY | |
| International Standard Book Number | 9781439839423 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="http://marc.crcnetbase.com/isbn/9781439839430">http://marc.crcnetbase.com/isbn/9781439839430</a> |
| Electronic format type | ebook |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | E-Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Indian Institute of Technology Tirupati | Indian Institute of Technology Tirupati | 10/11/2017 | 005.8 D812 | EB00418 | 10/11/2017 | 10/11/2017 | E-Books |