Data Mining and Machine Learning in Cybersecurity (Record no. 1020)

MARC details
000 -LEADER
fixed length control field 02150nam a2200373Ia 4500
001 - CONTROL NUMBER
control field AUP0KE11810PDF
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230515122024.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110525s2011 flua ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780429063756
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)727798816
040 ## - CATALOGING SOURCE
Original cataloging agency FlBoTFG
Transcribing agency FlBoTFG
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number D812
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9.D343
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) D825 2011
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Dua, Sumeet and Du, Xian
245 10 - TITLE STATEMENT
Title Data Mining and Machine Learning in Cybersecurity
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. c2011.
300 ## - PHYSICAL DESCRIPTION
Extent 256 p. :
Other physical details 69 B/W ill.
500 ## - GENERAL NOTE
General note An Auerbach book.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 2. Classical machine-learning paradigms for data mining -- 3. Supervised learning for misuse/signature detection -- 4. Machine learning for anomaly detection -- 5. Machine learning for hybrid detection -- 6. Machine learning for scan detection -- 7. Machine learning for profiling network traffic -- 8. Privacy-preserving data mining -- 9. Emerging challenges in cybersecurity.
520 ## - SUMMARY, ETC.
Summary, etc. Introducing basic concepts of machine learning and data mining methodologies for cyber security, this book provides a unified reference for specific machine learning solutions and cybersecurity problems. The authors focus on how to apply machine learning methodologies in cybersecurity, categorizing methods for detecting, scanning, profiling, intrusions, and anomalies. The text presents challenges and solutions in machine learning along with cybersecurity fundamentals. It also describes advanced problems in cybersecurity in the machine learning domain and examines privacy-preserving data mining methods as a proactive security solution--
Assigning source Provided by publisher.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print edition.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data mining.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Machine learning.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term lcsh
776 1# - ADDITIONAL PHYSICAL FORM ENTRY
International Standard Book Number 9781439839423
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://marc.crcnetbase.com/isbn/9781439839430">http://marc.crcnetbase.com/isbn/9781439839430</a>
Electronic format type ebook
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type E-Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Indian Institute of Technology Tirupati Indian Institute of Technology Tirupati 10/11/2017   005.8 D812 EB00418 10/11/2017 10/11/2017 E-Books