13 A Cybersecurity Perspective of Machine Learning Algorithms
Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, and Alka Agrawal
Contents
13.2.1 Classification-Based Supervised ML Techniques
13.2.2 Regression-Based Supervised ML Techniques
13.3 Unsupervised ML Approaches
13.3.1 Clustering-Based Unsupervised ML Techniques
13.3.2 Association-Based Unsupervised ML Techniques
13.4 Cybersecurity Perspective
13.1 Introduction
One of the prominent changes in the present world is the succession of information and communication technology. Over the past few decades, technological revolution has greatly been ...
Get Computational Intelligent Security in Wireless Communications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.