LEADER 03574nam 22006615 450 001 996465446203316 005 20200704111206.0 010 $a981-15-1706-1 024 7 $a10.1007/978-981-15-1706-8 035 $a(CKB)5280000000190053 035 $a(MiAaPQ)EBC6000805 035 $a(DE-He213)978-981-15-1706-8 035 $a(PPN)242817939 035 $a(EXLCZ)995280000000190053 100 $a20191216d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMachine Learning Approaches in Cyber Security Analytics$b[electronic resource] /$fby Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (217 pages) 311 $a981-15-1705-3 327 $aChapter 1. Introduction -- Chapter 2. Machine Learning Algorithms -- Chapter 3. Machine Learning in Cyber Security Analytics -- Chapter 4. Applications of Support Vector Machines -- Chapter 5. Applications of Nearest Neighbor -- Chapter 6. Applications of Clustering -- Chapter 7. Applications of Dimensionality Reduction -- Chapter 8. Applications of other Machine Learning Methods. 330 $aThis book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks. . 606 $aComputer security 606 $aApplication software 606 $aData encryption (Computer science) 606 $aComputer crimes 606 $aData structures (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCybercrime$3https://scigraph.springernature.com/ontologies/product-market-codes/1B7000 606 $aData Structures$3https://scigraph.springernature.com/ontologies/product-market-codes/I15017 615 0$aComputer security. 615 0$aApplication software. 615 0$aData encryption (Computer science). 615 0$aComputer crimes. 615 0$aData structures (Computer science). 615 14$aSystems and Data Security. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 615 24$aCybercrime. 615 24$aData Structures. 676 $a005.8 700 $aThomas$b Tony$4aut$4http://id.loc.gov/vocabulary/relators/aut$0222391 702 $aP. Vijayaraghavan$b Athira$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aEmmanuel$b Sabu$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465446203316 996 $aMachine Learning Approaches in Cyber Security Analytics$91916540 997 $aUNISA