Deep Learning Applications for Cyber Security / / edited by Mamoun Alazab, MingJian Tang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (260 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Big data
Computer crimes Neural networks (Computer science) Computer security System safety Big Data Cybercrime Mathematical Models of Cognitive Processes and Neural Networks Systems and Data Security Security Science and Technology |
ISBN | 3-030-13057-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft -- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems -- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks -- Using Convolutional Neural Networks for Classifying Malicious Network Traffic -- DBD: Deep Learning DGA-based Botnet Detection -- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks -- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach -- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks -- Forensic Detection of Child Exploitation Material using Deep Learning -- Toward Detection of Child Exploitation Material: A Forensic Approach. |
Record Nr. | UNINA-9910349287503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine Learning Algorithms for Signal and Image Processing |
Autore | Tripathi Suman Lata |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2022 |
Descrizione fisica | 1 online resource (752 pages) |
Altri autori (Persone) |
GhaiDeepika
SaxenaSobhit ChandaManash AlazabMamoun |
ISBN |
1-119-86185-3
1-119-86184-5 1-119-86183-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910632497803321 |
Tripathi Suman Lata | ||
Newark : , : John Wiley & Sons, Incorporated, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Malware analysis using artificial intelligence and deep learning / / Mark Stamp, Mamoun Alazab, Andrii Shalaginov, editors |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XX, 651 p. 253 illus., 209 illus. in color.) |
Disciplina | 005.84 |
Soggetto topico |
Malware (Computer software)
Artificial intelligence Computer security Machine learning |
ISBN | 3-030-62582-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Optimizing Multi-class Classification of Binaries Based on Static Features -- 2.Detecting Abusive Comments Using Ensemble Deep Learning Algorithms -- 3. Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS -- 4. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges -- 5. A Selective Survey of Deep Learning Techniques and Their Application to Malware Analysis -- 6. A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification -- 7. Word Embedding Techniques for Malware Evolution Detection -- 8. Reanimating Historic Malware Samples -- 9. DURLD: Malicious URL detection using Deep learning based Character-level representations -- 10. Sentiment Analysis for Troll Detection on Weibo -- 11. Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families -- 12. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs -- 13. An Empirical Analysis of Image-Based Learning Techniques for Malware Classification -- 14. A Survey of Intelligent Techniques for Android Malware Detection -- 15. Malware Detection with Sequence-Based Machine Learning and Deep Learning -- 16. A Novel Study on Multinomial Classification of x86/x64 Linux ELF Malware Types and Families through Deep Neural Networks -- 17. Cluster Analysis of Malware Family Relationships -- 18. Log-Based Malicious Activity Detection using Machine and Deep Learning -- 19. Deep Learning in Malware Identification and Classification -- 20. Image Spam Classification with Deep Neural Networks -- 21. Fast and Straightforward Feature Selection Method -- 22. On Ensemble Learning -- 23. A Comparative Study of Adversarial Attacks to Malware Detectors Based on Deep Learning -- 24. Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability -- 25. Universal Adversarial Perturbations and Image Spam Classifiers. |
Record Nr. | UNINA-9910484631603321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Malware analysis using artificial intelligence and deep learning / / Mark Stamp, Mamoun Alazab, Andrii Shalaginov, editors |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XX, 651 p. 253 illus., 209 illus. in color.) |
Disciplina | 005.84 |
Soggetto topico |
Malware (Computer software)
Artificial intelligence Computer security Machine learning |
ISBN | 3-030-62582-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Optimizing Multi-class Classification of Binaries Based on Static Features -- 2.Detecting Abusive Comments Using Ensemble Deep Learning Algorithms -- 3. Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS -- 4. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges -- 5. A Selective Survey of Deep Learning Techniques and Their Application to Malware Analysis -- 6. A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification -- 7. Word Embedding Techniques for Malware Evolution Detection -- 8. Reanimating Historic Malware Samples -- 9. DURLD: Malicious URL detection using Deep learning based Character-level representations -- 10. Sentiment Analysis for Troll Detection on Weibo -- 11. Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families -- 12. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs -- 13. An Empirical Analysis of Image-Based Learning Techniques for Malware Classification -- 14. A Survey of Intelligent Techniques for Android Malware Detection -- 15. Malware Detection with Sequence-Based Machine Learning and Deep Learning -- 16. A Novel Study on Multinomial Classification of x86/x64 Linux ELF Malware Types and Families through Deep Neural Networks -- 17. Cluster Analysis of Malware Family Relationships -- 18. Log-Based Malicious Activity Detection using Machine and Deep Learning -- 19. Deep Learning in Malware Identification and Classification -- 20. Image Spam Classification with Deep Neural Networks -- 21. Fast and Straightforward Feature Selection Method -- 22. On Ensemble Learning -- 23. A Comparative Study of Adversarial Attacks to Malware Detectors Based on Deep Learning -- 24. Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability -- 25. Universal Adversarial Perturbations and Image Spam Classifiers. |
Record Nr. | UNISA-996464411103316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy and Data Analytics [[electronic resource] ] : Select Proceedings of the 2nd International Conference, ISPDA 2022 / / edited by Udai Pratap Rao, Mamoun Alazab, Bhavesh N. Gohil, Pethuru Raj Chelliah |
Autore | Rao Udai Pratap |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (424 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
AlazabMamoun
GohilBhavesh N ChelliahPethuru Raj |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico |
Data protection
Database management Computers Computer engineering Computer networks Artificial intelligence Data and Information Security Database Management System Computing Milieux Computer Engineering and Networks Artificial Intelligence |
ISBN | 981-9935-69-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Recent Advancements on Energy-Saving LEACH Protocol in Wireless Sensor Network-Review -- Slow TCP Port Scan Detection Using Flow Data.-An Exploration of Digital Forensic Techniques: A Brief Survey -- Personality Based Friends Recommendation System for Social Networks -- Analysis of Different Sampling Techniques for Software Fault Prediction. |
Record Nr. | UNINA-9910741141303321 |
Rao Udai Pratap | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security, Privacy and Data Analytics [[electronic resource] ] : Select Proceedings of the 2nd International Conference, ISPDA 2022 / / edited by Udai Pratap Rao, Mamoun Alazab, Bhavesh N. Gohil, Pethuru Raj Chelliah |
Autore | Rao Udai Pratap |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (424 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
AlazabMamoun
GohilBhavesh N ChelliahPethuru Raj |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico |
Data protection
Database management Computers Computer engineering Computer networks Artificial intelligence Data and Information Security Database Management System Computing Milieux Computer Engineering and Networks Artificial Intelligence |
ISBN | 981-9935-69-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Recent Advancements on Energy-Saving LEACH Protocol in Wireless Sensor Network-Review -- Slow TCP Port Scan Detection Using Flow Data.-An Exploration of Digital Forensic Techniques: A Brief Survey -- Personality Based Friends Recommendation System for Social Networks -- Analysis of Different Sampling Techniques for Software Fault Prediction. |
Record Nr. | UNISA-996546838403316 |
Rao Udai Pratap | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|