LEADER 03919nam 22007695 450 001 9910366657003321 005 20241120154208.0 010 $a9789811517068 010 $a981-15-1706-1 024 7 $a10.1007/978-981-15-1706-8 035 $a(CKB)5280000000190053 035 $a(MiAaPQ)EBC6000805 035 $a(DE-He213)978-981-15-1706-8 035 $a(PPN)242817939 035 $a(EXLCZ)995280000000190053 100 $a20191216d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMachine learning approaches in cyber security analytics /$fTony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d[2020]. 215 $a1 online resource (217 pages) 311 1 $a9789811517051 311 1 $a981-15-1705-3 327 $aChapter 1. Introduction -- Chapter 2. Machine Learning Algorithms -- Chapter 3. Machine Learning in Cyber Security Analytics -- Chapter 4. Applications of Support Vector Machines -- Chapter 5. Applications of Nearest Neighbor -- Chapter 6. Applications of Clustering -- Chapter 7. Applications of Dimensionality Reduction -- Chapter 8. Applications of other Machine Learning Methods. 330 $aThis book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks. . 606 $aComputer security 606 $aApplication software 606 $aData encryption (Computer science) 606 $aComputer crimes 606 $aData structures (Computer science) 606 $aSeguretat informātica$2lemac 606 $aXifratge (Informātica)$2lemac 606 $aAprenentatge automātic$2lemac 606 $aDelictes informātics$2lemac 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCybercrime$3https://scigraph.springernature.com/ontologies/product-market-codes/1B7000 606 $aData Structures$3https://scigraph.springernature.com/ontologies/product-market-codes/I15017 615 0$aComputer security. 615 0$aApplication software. 615 0$aData encryption (Computer science) 615 0$aComputer crimes. 615 0$aData structures (Computer science) 615 7$aSeguretat informātica 615 7$aXifratge (Informātica) 615 7$aAprenentatge automātic 615 7$aDelictes informātics 615 14$aSystems and Data Security. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 615 24$aCybercrime. 615 24$aData Structures. 676 $a005.8 700 $aThomas$b Tony$4aut$4http://id.loc.gov/vocabulary/relators/aut$0222391 702 $aP. Vijayaraghavan$b Athira$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aEmmanuel$b Sabu$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910366657003321 996 $aMachine Learning Approaches in Cyber Security Analytics$91916540 997 $aUNINA