13 A Cybersecurity Perspective of Machine Learning Algorithms

Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, and Alka Agrawal

DOI: 10.1201/9781003323426-13

Contents

13.1 Introduction

13.2 Supervised ML Approaches

13.2.1 Classification-Based Supervised ML Techniques

13.2.2 Regression-Based Supervised ML Techniques

13.3 Unsupervised ML Approaches

13.3.1 Clustering-Based Unsupervised ML Techniques

13.3.2 Association-Based Unsupervised ML Techniques

13.4 Cybersecurity Perspective

13.5 Conclusion

References

13.1 Introduction

One of the prominent changes in the present world is the succession of information and communication technology. Over the past few decades, technological revolution has greatly been ...

Get Computational Intelligent Security in Wireless Communications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.