Book description
From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, this book provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals, surveys contemporary challenges, and details cutting-edge machine learning and data mining techniques. This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures and more than 40 case studies help readers visualize the workflow of complex techniques.
Table of contents
- Front Cover
- Contents (1/2)
- Contents (2/2)
- List of Figures
- List of Tables
- Preface
- Authors
- Chapter 1: Introduction (1/5)
- Chapter 1: Introduction (2/5)
- Chapter 1: Introduction (3/5)
- Chapter 1: Introduction (4/5)
- Chapter 1: Introduction (5/5)
- Chapter 2: Classical Machine-Learning Paradigms for Data Mining (1/7)
- Chapter 2: Classical Machine-Learning Paradigms for Data Mining (2/7)
- Chapter 2: Classical Machine-Learning Paradigms for Data Mining (3/7)
- Chapter 2: Classical Machine-Learning Paradigms for Data Mining (4/7)
- Chapter 2: Classical Machine-Learning Paradigms for Data Mining (5/7)
- Chapter 2: Classical Machine-Learning Paradigms for Data Mining (6/7)
- Chapter 2: Classical Machine-Learning Paradigms for Data Mining (7/7)
- Chapter 3: Supervised Learning for Misuse/Signature Detection (1/6)
- Chapter 3: Supervised Learning for Misuse/Signature Detection (2/6)
- Chapter 3: Supervised Learning for Misuse/Signature Detection (3/6)
- Chapter 3: Supervised Learning for Misuse/Signature Detection (4/6)
- Chapter 3: Supervised Learning for Misuse/Signature Detection (5/6)
- Chapter 3: Supervised Learning for Misuse/Signature Detection (6/6)
- Chapter 4: Machine Learning for Anomaly Detection (1/6)
- Chapter 4: Machine Learning for Anomaly Detection (2/6)
- Chapter 4: Machine Learning for Anomaly Detection (3/6)
- Chapter 4: Machine Learning for Anomaly Detection (4/6)
- Chapter 4: Machine Learning for Anomaly Detection (5/6)
- Chapter 4: Machine Learning for Anomaly Detection (6/6)
- Chapter 5: Machine Learning for Hybrid Detection (1/5)
- Chapter 5: Machine Learning for Hybrid Detection (2/5)
- Chapter 5: Machine Learning for Hybrid Detection (3/5)
- Chapter 5: Machine Learning for Hybrid Detection (4/5)
- Chapter 5: Machine Learning for Hybrid Detection (5/5)
- Chapter 6: Machine Learning for Scan Detection (1/4)
- Chapter 6: Machine Learning for Scan Detection (2/4)
- Chapter 6: Machine Learning for Scan Detection (3/4)
- Chapter 6: Machine Learning for Scan Detection (4/4)
- Chapter 7: Machine Learning for Profiling Network Traffic (1/4)
- Chapter 7: Machine Learning for Profiling Network Traffic (2/4)
- Chapter 7: Machine Learning for Profiling Network Traffic (3/4)
- Chapter 7: Machine Learning for Profiling Network Traffic (4/4)
- Chapter 8: Privacy-Preserving Data Mining (1/6)
- Chapter 8: Privacy-Preserving Data Mining (2/6)
- Chapter 8: Privacy-Preserving Data Mining (3/6)
- Chapter 8: Privacy-Preserving Data Mining (4/6)
- Chapter 8: Privacy-Preserving Data Mining (5/6)
- Chapter 8: Privacy-Preserving Data Mining (6/6)
- Chapter 9: Emerging Challenges in Cybersecurity (1/4)
- Chapter 9: Emerging Challenges in Cybersecurity (2/4)
- Chapter 9: Emerging Challenges in Cybersecurity (3/4)
- Chapter 9: Emerging Challenges in Cybersecurity (4/4)
- Back Cover
Product information
- Title: Data Mining and Machine Learning in Cybersecurity
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781439839430
You might also like
book
Malware Data Science
"Security has become a ""big data"" problem. The growth rate of malware has accelerated to tens …
book
Mastering Machine Learning for Penetration Testing
Become a master at penetration testing using machine learning with Python About This Book Identify ambiguities …
book
Hands-On Machine Learning with ML.NET
Create, train, and evaluate various machine learning models such as regression, classification, and clustering using ML.NET, …
book
Security with AI and Machine Learning
For security professionals seeking reliable ways to combat persistent threats to their networks, there’s encouraging news. …