This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
Weiterlesen
covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud ...
Weiterlesen
This book is intended to present the state of the art in research on machine learning and big data analytics. The accepted ...
Weiterlesen
This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain ...
Weiterlesen
Describes traditional as well as advanced machine learning algorithms Enables students to learn which algorithm is most appropriate ...
Weiterlesen
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
Weiterlesen
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Weiterlesen
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Weiterlesen
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
WeiterlesenThis two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Weiterlesen
This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Weiterlesen
Malware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...
Weiterlesen
Discusses the IT management tasks and the objects involved. This book outlines traditional IT management; deals with controlling ...
Weiterlesen
This open access book presents the outcomes of the “Design for Future – Managed Software Evolution” .The different ...
Weiterlesen
Discover state-of-the-art developments in DCNs from leading international voices in the field. Delivers a rigorous and insightful ...
Weiterlesen
At the beginning of each year, there is a deluge of top-10 lists on just about every subject you can imagine. A top-10 list ...
Weiterlesen
This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts ...
Weiterlesen
The book deals with the management of information systems security and privacy, based on a model that covers technological, ...
Weiterlesen
This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
Weiterlesen