top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
AI and machine learning for network and security management / / Yulei Wu, Jingguo Ge and Tong Li
AI and machine learning for network and security management / / Yulei Wu, Jingguo Ge and Tong Li
Autore Wu Yulei
Pubbl/distr/stampa Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2023]
Descrizione fisica 1 online resource (338 pages)
Disciplina 006.3
Collana IEEE Press series on networks and services management
Soggetto topico Computer networks - Security measures - Data processing
Artificial intelligence
Machine learning
ISBN 1-119-83590-9
1-119-83589-5
1-119-83588-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Table of Contents -- Title Page -- Copyright -- Author Biographies -- Preface -- Acknowledgments -- Acronyms -- 1 Introduction -- 1.1 Introduction -- 1.2 Organization of the Book -- 1.3 Conclusion -- References -- 2 When Network and Security Management Meets AI and Machine Learning -- 2.1 Introduction -- 2.2 Architecture of Machine Learning‐Empowered Network and Security Management -- 2.3 Supervised Learning -- 2.4 Semisupervised and Unsupervised Learning -- 2.5 Reinforcement Learning -- 2.6 Industry Products on Network and Security Management -- 2.7 Standards on Network and Security Management -- 2.8 Projects on Network and Security Management -- 2.9 Proof‐of‐Concepts on Network and Security Management -- 2.10 Conclusion -- References -- Notes -- 3 Learning Network Intents for Autonomous Network Management* -- 3.1 Introduction -- 3.2 Motivation -- 3.3 The Hierarchical Representation and Learning Framework for Intention Symbols Inference -- 3.4 Experiments -- 3.5 Conclusion -- References -- Notes -- 4 Virtual Network Embedding via Hierarchical Reinforcement Learning1 -- 4.1 Introduction -- 4.2 Motivation -- 4.3 Preliminaries and Notations -- 4.4 The Framework of VNE‐HRL -- 4.5 Case Study -- 4.6 Related Work -- 4.7 Conclusion -- References -- Note -- 5 Concept Drift Detection for Network Traffic Classification -- 5.1 Related Concepts of Machine Learning in Data Stream Processing -- 5.2 Using an Active Approach to Solve Concept Drift in the Intrusion Detection Field -- 5.3 Concept Drift Detector Based on CVAE -- 5.4 Deployment and Experiment in Real Networks -- 5.5 Future Research Challenges and Open Issues -- 5.6 Conclusion -- References -- Note -- 6 Online Encrypted Traffic Classification Based on Lightweight Neural Networks* -- 6.1 Introduction -- 6.2 Motivation -- 6.3 Preliminaries -- 6.4 The Proposed Lightweight Model.
6.5 Case Study -- 6.6 Related Work -- 6.7 Conclusion -- References -- Notes -- 7 Context‐Aware Learning for Robust Anomaly Detection* -- 7.1 Introduction -- 7.2 Pronouns -- 7.3 The Proposed Method - AllRobust -- 7.4 Experiments -- 7.5 Discussion -- 7.6 Conclusion -- References -- Note -- 8 Anomaly Classification with Unknown, Imbalanced and Few Labeled Log Data -- 8.1 Introduction -- 8.2 Examples -- 8.3 Methodology -- 8.4 Experimental Results and Analysis -- 8.5 Discussion -- 8.6 Conclusion -- References -- Notes -- 9 Zero Trust Networks -- 9.1 Introduction to Zero‐Trust Networks -- 9.2 Zero‐Trust Network Solutions -- 9.3 Machine Learning Powered Zero Trust Networks -- 9.4 Conclusion -- References -- 10 Intelligent Network Management and Operation Systems -- 10.1 Introduction -- 10.2 Traditional Operation and Maintenance Systems -- 10.3 Security Operation and Maintenance -- 10.4 AIOps -- 10.5 Machine Learning‐Based Network Security Monitoring and Management Systems -- 10.6 Conclusion -- References -- 11 Conclusions, and Research Challenges and Open Issues -- 11.1 Conclusions -- 11.2 Research Challenges and Open Issues -- References -- Index -- End User License Agreement.
Record Nr. UNINA-9910830309403321
Wu Yulei  
Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-risk informatics : engineering evaluation with data sciencef / / Mehmet Sahinoglu, PhD
Cyber-risk informatics : engineering evaluation with data sciencef / / Mehmet Sahinoglu, PhD
Autore Sahinoglu Mehmet <1951->
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2016
Descrizione fisica 1 online resource (745 p.)
Disciplina 005.8
Collana New York Academy of Sciences
Soggetto topico Cyber intelligence (Computer security)
Computer systems - Reliability
Computer software - Reliability
Computer networks - Security measures - Data processing
Risk assessment - Statistical methods
ISBN 1-119-08752-X
1-119-08753-8
Classificazione 007.1
005.8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Metrics, statistical quality control and basic reliability in cyber-risk -- Complex network reliability evaluation and estimation in cyber-risk -- Stopping rules for reliability and security tests in cyber-risk -- Security assessment and management in cyber-risk -- Game-theoretic computing in cyber-risk -- Modeling and simulation in cyber-risk -- Cloud computing in cyber-risk -- Software reliability modeling and metrics in cyber-risk -- Metrics for software reliability failure-count models in cyber-risk -- Practical hands-on lab topics in cyber-risk.
Record Nr. UNINA-9910796686603321
Sahinoglu Mehmet <1951->  
Hoboken, New Jersey : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-risk informatics : engineering evaluation with data sciencef / / Mehmet Sahinoglu, PhD
Cyber-risk informatics : engineering evaluation with data sciencef / / Mehmet Sahinoglu, PhD
Autore Sahinoglu Mehmet <1951->
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2016
Descrizione fisica 1 online resource (745 p.)
Disciplina 005.8
Collana New York Academy of Sciences
Soggetto topico Cyber intelligence (Computer security)
Computer systems - Reliability
Computer software - Reliability
Computer networks - Security measures - Data processing
Risk assessment - Statistical methods
ISBN 1-119-08752-X
1-119-08753-8
Classificazione 007.1
005.8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Metrics, statistical quality control and basic reliability in cyber-risk -- Complex network reliability evaluation and estimation in cyber-risk -- Stopping rules for reliability and security tests in cyber-risk -- Security assessment and management in cyber-risk -- Game-theoretic computing in cyber-risk -- Modeling and simulation in cyber-risk -- Cloud computing in cyber-risk -- Software reliability modeling and metrics in cyber-risk -- Metrics for software reliability failure-count models in cyber-risk -- Practical hands-on lab topics in cyber-risk.
Record Nr. UNINA-9910814733203321
Sahinoglu Mehmet <1951->  
Hoboken, New Jersey : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Pubbl/distr/stampa Boca Raton : , : CRC Press, , [2019]
Descrizione fisica 1 online resource (365 pages)
Disciplina 006.3/1
Soggetto topico Computer networks - Security measures - Data processing
Computer security - Data processing
Machine learning
Artificial intelligence
ISBN 0-429-99572-5
0-429-50404-7
0-429-99571-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index
Record Nr. UNINA-9910793310903321
Boca Raton : , : CRC Press, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Pubbl/distr/stampa Boca Raton : , : CRC Press, , [2019]
Descrizione fisica 1 online resource (365 pages)
Disciplina 006.3/1
Soggetto topico Computer networks - Security measures - Data processing
Computer security - Data processing
Machine learning
Artificial intelligence
ISBN 0-429-99572-5
0-429-50404-7
0-429-99571-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index
Record Nr. UNINA-9910799931803321
Boca Raton : , : CRC Press, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Pubbl/distr/stampa Boca Raton : , : CRC Press, , [2019]
Descrizione fisica 1 online resource (365 pages)
Disciplina 006.3/1
Soggetto topico Computer networks - Security measures - Data processing
Computer security - Data processing
Machine learning
Artificial intelligence
ISBN 0-429-99572-5
0-429-50404-7
0-429-99571-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index
Record Nr. UNINA-9910814465803321
Boca Raton : , : CRC Press, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui