Book Details

Artificial Intelligence and Data Mining Approaches in Security Frameworks / Neeraj Bhargava, Ritu Bhargava, Pramod Singh Rathore, Rashmi Agrawal

Publication year: 2021

ISBN: 1119760402

Internet Resource: Please Login to download book


Offers solutions to the problems of security, outlining the concepts behind allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts. provides state of the art approaches of artificial intelligence and data mining in these areas. It includes areas of detection, prediction, as well as future framework identification, development, building service systems and analytical aspects. In all these topics, applications of AI and data mining, such as artificial neural networks, fuzzy logic, genetic algorithm and hybrid mechanisms, are explained and explored. This book is aimed at the modeling and performance prediction of efficient security framework systems, bringing to light a new dimension in the theory and practice. This groundbreaking new volume presents these topics and trends, bridging the research gap on AI and data mining to enable wide-scale implementation. Whether for the veteran engineer or the student, this is a must-have for any library. This groundbreaking new volume: Clarifies the understanding of certain key mechanisms of technology helpful in the use of artificial intelligence and data mining in security frameworks Covers practical approaches to the problems engineers face in working in this field, focusing on the applications used every day Contains numerous examples, offering critical solutions to engineers and scientists Presents these new applications of AI and data mining that are of prime importance to human civilization as a whole


Subject: Communication Technology, Communication System Security, Artificial intelligence, Data mining, Computer security, Cyber Security, Privacy Preserving, Security Framework, Botnet Detection, Spam Filtering Using AI, Biometric Facial Detection and Recognition, Threat Analysis Using Data Mining Technique, Intrusion Detection Using Data Mining,