03574nam 22006615 450 99646544620331620200704111206.0981-15-1706-110.1007/978-981-15-1706-8(CKB)5280000000190053(MiAaPQ)EBC6000805(DE-He213)978-981-15-1706-8(PPN)242817939(EXLCZ)99528000000019005320191216d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierMachine Learning Approaches in Cyber Security Analytics[electronic resource] /by Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel1st ed. 2020.Singapore :Springer Singapore :Imprint: Springer,2020.1 online resource (217 pages)981-15-1705-3 Chapter 1. Introduction -- Chapter 2. Machine Learning Algorithms -- Chapter 3. Machine Learning in Cyber Security Analytics -- Chapter 4. Applications of Support Vector Machines -- Chapter 5. Applications of Nearest Neighbor -- Chapter 6. Applications of Clustering -- Chapter 7. Applications of Dimensionality Reduction -- Chapter 8. Applications of other Machine Learning Methods.This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks. .Computer securityApplication softwareData encryption (Computer science)Computer crimesData structures (Computer science)Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Cybercrimehttps://scigraph.springernature.com/ontologies/product-market-codes/1B7000Data Structureshttps://scigraph.springernature.com/ontologies/product-market-codes/I15017Computer security.Application software.Data encryption (Computer science).Computer crimes.Data structures (Computer science).Systems and Data Security.Information Systems Applications (incl. Internet).Cryptology.Cybercrime.Data Structures.005.8Thomas Tonyauthttp://id.loc.gov/vocabulary/relators/aut222391P. Vijayaraghavan Athiraauthttp://id.loc.gov/vocabulary/relators/autEmmanuel Sabuauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK996465446203316Machine Learning Approaches in Cyber Security Analytics1916540UNISA