LEADER 00831nam0-22002651i-450- 001 990003597010403321 005 20001010 035 $a000359701 035 $aFED01000359701 035 $a(Aleph)000359701FED01 035 $a000359701 100 $a20000920d1960----km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aFlackuations in trade, industry and fina nce. A study of British economic developmen t.$fJ.R.T. Hughes. 210 $aOxford$cs.e.$d1960 700 1$aHughes,$bJonathan R. T.$f<1929- >$0374638 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003597010403321 952 $aSE 10T.01.020-$bS.I.$fDECSE 959 $aDECSE 996 $aFlackuations in trade, industry and fina nce. A study of British economic developmen t$9494255 997 $aUNINA DB $aING01 LEADER 04895nam 2200529 450 001 9910830309403321 005 20230317185302.0 010 $a1-119-83590-9 010 $a1-119-83589-5 010 $a1-119-83588-7 035 $a(MiAaPQ)EBC7127888 035 $a(Au-PeEL)EBL7127888 035 $a(CKB)25219376400041 035 $a(EXLCZ)9925219376400041 100 $a20230317d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAI and machine learning for network and security management /$fYulei Wu, Jingguo Ge and Tong Li 210 1$aPiscataway, New Jersey ;$aHoboken, New Jersey :$cIEEE Press :$cWiley,$d[2023] 210 4$dİ2023 215 $a1 online resource (338 pages) 225 1 $aIEEE Press series on networks and services management 311 08$aPrint version: Ge, Jingguo AI and Machine Learning for Network and Security Management Newark : John Wiley & Sons, Incorporated,c2022 9781119835875 320 $aIncludes bibliographical references and index. 327 $aIntro -- Table of Contents -- Title Page -- Copyright -- Author Biographies -- Preface -- Acknowledgments -- Acronyms -- 1 Introduction -- 1.1 Introduction -- 1.2 Organization of the Book -- 1.3 Conclusion -- References -- 2 When Network and Security Management Meets AI and Machine Learning -- 2.1 Introduction -- 2.2 Architecture of Machine Learning?Empowered Network and Security Management -- 2.3 Supervised Learning -- 2.4 Semisupervised and Unsupervised Learning -- 2.5 Reinforcement Learning -- 2.6 Industry Products on Network and Security Management -- 2.7 Standards on Network and Security Management -- 2.8 Projects on Network and Security Management -- 2.9 Proof?of?Concepts on Network and Security Management -- 2.10 Conclusion -- References -- Notes -- 3 Learning Network Intents for Autonomous Network Management* -- 3.1 Introduction -- 3.2 Motivation -- 3.3 The Hierarchical Representation and Learning Framework for Intention Symbols Inference -- 3.4 Experiments -- 3.5 Conclusion -- References -- Notes -- 4 Virtual Network Embedding via Hierarchical Reinforcement Learning1 -- 4.1 Introduction -- 4.2 Motivation -- 4.3 Preliminaries and Notations -- 4.4 The Framework of VNE?HRL -- 4.5 Case Study -- 4.6 Related Work -- 4.7 Conclusion -- References -- Note -- 5 Concept Drift Detection for Network Traffic Classification -- 5.1 Related Concepts of Machine Learning in Data Stream Processing -- 5.2 Using an Active Approach to Solve Concept Drift in the Intrusion Detection Field -- 5.3 Concept Drift Detector Based on CVAE -- 5.4 Deployment and Experiment in Real Networks -- 5.5 Future Research Challenges and Open Issues -- 5.6 Conclusion -- References -- Note -- 6 Online Encrypted Traffic Classification Based on Lightweight Neural Networks* -- 6.1 Introduction -- 6.2 Motivation -- 6.3 Preliminaries -- 6.4 The Proposed Lightweight Model. 327 $a6.5 Case Study -- 6.6 Related Work -- 6.7 Conclusion -- References -- Notes -- 7 Context?Aware Learning for Robust Anomaly Detection* -- 7.1 Introduction -- 7.2 Pronouns -- 7.3 The Proposed Method?-?AllRobust -- 7.4 Experiments -- 7.5 Discussion -- 7.6 Conclusion -- References -- Note -- 8 Anomaly Classification with Unknown, Imbalanced and Few Labeled Log Data -- 8.1 Introduction -- 8.2 Examples -- 8.3 Methodology -- 8.4 Experimental Results and Analysis -- 8.5 Discussion -- 8.6 Conclusion -- References -- Notes -- 9 Zero Trust Networks -- 9.1 Introduction to Zero?Trust Networks -- 9.2 Zero?Trust Network Solutions -- 9.3 Machine Learning Powered Zero Trust Networks -- 9.4 Conclusion -- References -- 10 Intelligent Network Management and Operation Systems -- 10.1 Introduction -- 10.2 Traditional Operation and Maintenance Systems -- 10.3 Security Operation and Maintenance -- 10.4 AIOps -- 10.5 Machine Learning?Based Network Security Monitoring and Management Systems -- 10.6 Conclusion -- References -- 11 Conclusions, and Research Challenges and Open Issues -- 11.1 Conclusions -- 11.2 Research Challenges and Open Issues -- References -- Index -- End User License Agreement. 410 0$aIEEE Press series on networks and services management. 606 $aComputer networks$xSecurity measures$xData processing 606 $aArtificial intelligence 606 $aMachine learning 615 0$aComputer networks$xSecurity measures$xData processing. 615 0$aArtificial intelligence. 615 0$aMachine learning. 676 $a006.3 700 $aWu$b Yulei$01619491 702 $aGe$b Jingguo 702 $aLi$b Tong 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830309403321 996 $aAI and machine learning for network and security management$93951754 997 $aUNINA LEADER 05459nam 22007575 450 001 9910370247203321 005 20251010080443.0 010 $a3-030-23491-6 024 7 $a10.1007/978-3-030-23491-1 035 $a(CKB)4940000000159125 035 $a(MiAaPQ)EBC6005217 035 $a(DE-He213)978-3-030-23491-1 035 $a(PPN)259454494 035 $a(EXLCZ)994940000000159125 100 $a20200101d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGlobal Health Security $eRecognizing Vulnerabilities, Creating Opportunities /$fedited by Anthony J. Masys, Ricardo Izurieta, Miguel Reina Ortiz 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (425 pages) 225 1 $aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 311 08$a3-030-23490-8 327 $aForward -- Section 1 Emerging threats -- Plagues, Epidemics and Pandemics; R. Izurieta -- Agricultural Emergencies: Factors and Impacts in the Spread of Transboundary Diseases in, and adjacent to, Agriculture -- The Threat within: mitigating the risk of medical error -- Climate Change, Extreme Weather Events and Global Health Security- A lens into vulnerabilities; C. Bell, A. Masys -- Global Health Biosecurity in a Vulnerable World ? An Evaluation of Emerging Threats and Current Disaster Preparedness Strategies for the Future -- The emerging threat of Ebola -- Section 2: Mitigation, Preparedness and Response and Recovery -- Natural and Manmade Disasters: Vulnerable Populations -- Sexual Violence -- Global Health Security and Weapons of Mass Destruction; C. Reynolds -- Antimicrobial Resistance in One Health -- Food Security ? microbiological and chemical risks -- Section 3: Exploring the technology Landscape for Solutions. Gaussianization of variational Bayesian approximations with correlated non-nested non-negligible posterior mean random effects employing non-negativity constraint analogs and analytical depossinization for iteratively fitting capture point, Aedes aegypti habitat non-zero autocorrelated prognosticators: A case study in evidential probabilities for non-frequentistic forecast epi-entomological time series modeling of arboviral infections -- Simulation, Modeling and Telemedicine in Global Health Security; A. French -- The growing role of social media in international health security: The good, the bad, and the ugly -- Section 4: Leadership and partnerships. Effecting Collective Impact through Collective Leadership on a Foundation of Generative Relationships -- Global Health Innovations. 330 $aWith our highly connected and interdependent world, the growing threat of infectious diseases and public health crisis has shed light on the requirement for global efforts to manage and combat highly pathogenic infectious diseases and other public health crisis on an unprecedented level. Such disease threats transcend borders. Reducing global threats posed by infectious disease outbreaks ? whether naturally caused or resulting from a deliberate or accidental release ? requires efforts that cross the disaster management pillars: mitigation, preparedness, response and recovery. This book addresses the issues of global health security along 4 themes: Emerging Threats; Mitigation, Preparedness, Response and Recovery; Exploring the Technology Landscape for Solutions; Leadership and Partnership. The authors of this volume highlight many of the challenges that confront our global security environment today. These range from politically induced disasters, to food insecurity, to zoonosis and terrorism. More optimistically, the authors also present some advances in technology that can help us combat these threats. Understanding the challenges that confront us and the tools we have to overcome them will allow us to face our future with confidence. 410 0$aAdvanced Sciences and Technologies for Security Applications,$x2363-9466 606 $aEconomic development 606 $aEpidemiology 606 $aScience$xSocial aspects 606 $aEnvironmental health 606 $aSecurity systems 606 $aWater 606 $aHydrology 606 $aDevelopment Studies 606 $aEpidemiology 606 $aScience and Technology Studies 606 $aEnvironmental Health 606 $aSecurity Science and Technology 606 $aWater 615 0$aEconomic development. 615 0$aEpidemiology. 615 0$aScience$xSocial aspects. 615 0$aEnvironmental health. 615 0$aSecurity systems. 615 0$aWater. 615 0$aHydrology. 615 14$aDevelopment Studies. 615 24$aEpidemiology. 615 24$aScience and Technology Studies. 615 24$aEnvironmental Health. 615 24$aSecurity Science and Technology. 615 24$aWater. 676 $a362.1 702 $aMasys$b Anthony J$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIzurieta$b Ricardo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aReina Ortiz$b Miguel$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910370247203321 996 $aGlobal Health Security$92126300 997 $aUNINA