top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Deep Learning Applications for Cyber Security / / edited by Mamoun Alazab, MingJian Tang
Deep Learning Applications for Cyber Security / / edited by Mamoun Alazab, MingJian Tang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (260 pages)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Big data
Computer crimes
Neural networks (Computer science) 
Computer security
System safety
Big Data
Cybercrime
Mathematical Models of Cognitive Processes and Neural Networks
Systems and Data Security
Security Science and Technology
ISBN 3-030-13057-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft -- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems -- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks -- Using Convolutional Neural Networks for Classifying Malicious Network Traffic -- DBD: Deep Learning DGA-based Botnet Detection -- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks -- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach -- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks -- Forensic Detection of Child Exploitation Material using Deep Learning -- Toward Detection of Child Exploitation Material: A Forensic Approach.
Record Nr. UNINA-9910349287503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine Learning Algorithms for Signal and Image Processing
Machine Learning Algorithms for Signal and Image Processing
Autore Tripathi Suman Lata
Pubbl/distr/stampa Newark : , : John Wiley & Sons, Incorporated, , 2022
Descrizione fisica 1 online resource (752 pages)
Altri autori (Persone) GhaiDeepika
SaxenaSobhit
ChandaManash
AlazabMamoun
ISBN 1-119-86185-3
1-119-86184-5
1-119-86183-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910632497803321
Tripathi Suman Lata  
Newark : , : John Wiley & Sons, Incorporated, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Malware analysis using artificial intelligence and deep learning / / Mark Stamp, Mamoun Alazab, Andrii Shalaginov, editors
Malware analysis using artificial intelligence and deep learning / / Mark Stamp, Mamoun Alazab, Andrii Shalaginov, editors
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XX, 651 p. 253 illus., 209 illus. in color.)
Disciplina 005.84
Soggetto topico Malware (Computer software)
Artificial intelligence
Computer security
Machine learning
ISBN 3-030-62582-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Optimizing Multi-class Classification of Binaries Based on Static Features -- 2.Detecting Abusive Comments Using Ensemble Deep Learning Algorithms -- 3. Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS -- 4. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges -- 5. A Selective Survey of Deep Learning Techniques and Their Application to Malware Analysis -- 6. A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification -- 7. Word Embedding Techniques for Malware Evolution Detection -- 8. Reanimating Historic Malware Samples -- 9. DURLD: Malicious URL detection using Deep learning based Character-level representations -- 10. Sentiment Analysis for Troll Detection on Weibo -- 11. Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families -- 12. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs -- 13. An Empirical Analysis of Image-Based Learning Techniques for Malware Classification -- 14. A Survey of Intelligent Techniques for Android Malware Detection -- 15. Malware Detection with Sequence-Based Machine Learning and Deep Learning -- 16. A Novel Study on Multinomial Classification of x86/x64 Linux ELF Malware Types and Families through Deep Neural Networks -- 17. Cluster Analysis of Malware Family Relationships -- 18. Log-Based Malicious Activity Detection using Machine and Deep Learning -- 19. Deep Learning in Malware Identification and Classification -- 20. Image Spam Classification with Deep Neural Networks -- 21. Fast and Straightforward Feature Selection Method -- 22. On Ensemble Learning -- 23. A Comparative Study of Adversarial Attacks to Malware Detectors Based on Deep Learning -- 24. Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability -- 25. Universal Adversarial Perturbations and Image Spam Classifiers.
Record Nr. UNINA-9910484631603321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Malware analysis using artificial intelligence and deep learning / / Mark Stamp, Mamoun Alazab, Andrii Shalaginov, editors
Malware analysis using artificial intelligence and deep learning / / Mark Stamp, Mamoun Alazab, Andrii Shalaginov, editors
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XX, 651 p. 253 illus., 209 illus. in color.)
Disciplina 005.84
Soggetto topico Malware (Computer software)
Artificial intelligence
Computer security
Machine learning
ISBN 3-030-62582-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Optimizing Multi-class Classification of Binaries Based on Static Features -- 2.Detecting Abusive Comments Using Ensemble Deep Learning Algorithms -- 3. Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS -- 4. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges -- 5. A Selective Survey of Deep Learning Techniques and Their Application to Malware Analysis -- 6. A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification -- 7. Word Embedding Techniques for Malware Evolution Detection -- 8. Reanimating Historic Malware Samples -- 9. DURLD: Malicious URL detection using Deep learning based Character-level representations -- 10. Sentiment Analysis for Troll Detection on Weibo -- 11. Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families -- 12. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs -- 13. An Empirical Analysis of Image-Based Learning Techniques for Malware Classification -- 14. A Survey of Intelligent Techniques for Android Malware Detection -- 15. Malware Detection with Sequence-Based Machine Learning and Deep Learning -- 16. A Novel Study on Multinomial Classification of x86/x64 Linux ELF Malware Types and Families through Deep Neural Networks -- 17. Cluster Analysis of Malware Family Relationships -- 18. Log-Based Malicious Activity Detection using Machine and Deep Learning -- 19. Deep Learning in Malware Identification and Classification -- 20. Image Spam Classification with Deep Neural Networks -- 21. Fast and Straightforward Feature Selection Method -- 22. On Ensemble Learning -- 23. A Comparative Study of Adversarial Attacks to Malware Detectors Based on Deep Learning -- 24. Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability -- 25. Universal Adversarial Perturbations and Image Spam Classifiers.
Record Nr. UNISA-996464411103316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy and Data Analytics [[electronic resource] ] : Select Proceedings of the 2nd International Conference, ISPDA 2022 / / edited by Udai Pratap Rao, Mamoun Alazab, Bhavesh N. Gohil, Pethuru Raj Chelliah
Security, Privacy and Data Analytics [[electronic resource] ] : Select Proceedings of the 2nd International Conference, ISPDA 2022 / / edited by Udai Pratap Rao, Mamoun Alazab, Bhavesh N. Gohil, Pethuru Raj Chelliah
Autore Rao Udai Pratap
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (424 pages)
Disciplina 005.8
Altri autori (Persone) AlazabMamoun
GohilBhavesh N
ChelliahPethuru Raj
Collana Lecture Notes in Electrical Engineering
Soggetto topico Data protection
Database management
Computers
Computer engineering
Computer networks
Artificial intelligence
Data and Information Security
Database Management System
Computing Milieux
Computer Engineering and Networks
Artificial Intelligence
ISBN 981-9935-69-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Recent Advancements on Energy-Saving LEACH Protocol in Wireless Sensor Network-Review -- Slow TCP Port Scan Detection Using Flow Data.-An Exploration of Digital Forensic Techniques: A Brief Survey -- Personality Based Friends Recommendation System for Social Networks -- Analysis of Different Sampling Techniques for Software Fault Prediction.
Record Nr. UNINA-9910741141303321
Rao Udai Pratap  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, Privacy and Data Analytics [[electronic resource] ] : Select Proceedings of the 2nd International Conference, ISPDA 2022 / / edited by Udai Pratap Rao, Mamoun Alazab, Bhavesh N. Gohil, Pethuru Raj Chelliah
Security, Privacy and Data Analytics [[electronic resource] ] : Select Proceedings of the 2nd International Conference, ISPDA 2022 / / edited by Udai Pratap Rao, Mamoun Alazab, Bhavesh N. Gohil, Pethuru Raj Chelliah
Autore Rao Udai Pratap
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (424 pages)
Disciplina 005.8
Altri autori (Persone) AlazabMamoun
GohilBhavesh N
ChelliahPethuru Raj
Collana Lecture Notes in Electrical Engineering
Soggetto topico Data protection
Database management
Computers
Computer engineering
Computer networks
Artificial intelligence
Data and Information Security
Database Management System
Computing Milieux
Computer Engineering and Networks
Artificial Intelligence
ISBN 981-9935-69-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Recent Advancements on Energy-Saving LEACH Protocol in Wireless Sensor Network-Review -- Slow TCP Port Scan Detection Using Flow Data.-An Exploration of Digital Forensic Techniques: A Brief Survey -- Personality Based Friends Recommendation System for Social Networks -- Analysis of Different Sampling Techniques for Software Fault Prediction.
Record Nr. UNISA-996546838403316
Rao Udai Pratap  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui