04434nam 22006495 450 991034928750332120220321134735.03-030-13057-610.1007/978-3-030-13057-2(CKB)4100000009040430(MiAaPQ)EBC5851295(DE-He213)978-3-030-13057-2(PPN)242849504(EXLCZ)99410000000904043020190814d2019 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierDeep Learning Applications for Cyber Security /edited by Mamoun Alazab, MingJian Tang1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (260 pages)Advanced Sciences and Technologies for Security Applications,1613-51133-030-13056-8 Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft -- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems -- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks -- Using Convolutional Neural Networks for Classifying Malicious Network Traffic -- DBD: Deep Learning DGA-based Botnet Detection -- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks -- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach -- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks -- Forensic Detection of Child Exploitation Material using Deep Learning -- Toward Detection of Child Exploitation Material: A Forensic Approach.Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points. .Advanced Sciences and Technologies for Security Applications,1613-5113Big dataComputer crimesNeural networks (Computer science) Computer securitySystem safetyBig Datahttps://scigraph.springernature.com/ontologies/product-market-codes/I29120Cybercrimehttps://scigraph.springernature.com/ontologies/product-market-codes/1B7000Mathematical Models of Cognitive Processes and Neural Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/M13100Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Security Science and Technologyhttps://scigraph.springernature.com/ontologies/product-market-codes/P31080Big data.Computer crimes.Neural networks (Computer science) .Computer security.System safety.Big Data.Cybercrime.Mathematical Models of Cognitive Processes and Neural Networks.Systems and Data Security.Security Science and Technology.005.8005.8Alazab Mamounedthttp://id.loc.gov/vocabulary/relators/edtTang MingJianedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910349287503321Deep Learning Applications for Cyber Security2524171UNINA