4 Support Vector Machines and Malware Detection -- 4.1 Introduction -- 4.2 Malware Detection -- 4.3 Maximizing the Margin and Hyperplane Optimization -- 4.4 Lagrange Multiplier -- 4.5 Kernel Methods -- 4.6 Permission-Based Static Android Malware Detection Using SVM -- 4.6.1 Experimental Results and Discussion -- 4.7 API Call-Based Static Android Malware Detection Using SVM -- 4.7.1 Experimental Results and Discussion -- 4.8 Conclusions and Directions for Research -- 4.8.1 State of the Art -- 5 Clustering and Malware Classification -- 5.1 Introduction -- 5.2 Algorithms Used for Clustering
متن يادداشت
5.3 Feature Extraction -- 5.4 Implementation -- 5.5 K-Means Clustering -- 5.6 Fuzzy C-Means Clustering -- 5.7 Density-Based Clustering -- 5.7.1 Density-Based Spatial Clustering of Applications with Noise (DBSCAN) -- 5.8 Hierarchical Clustering -- 5.9 State of the Art of Clustering Applications -- 5.10 Conclusion -- 6 Nearest Neighbor and Fingerprint Classification -- 6.1 Introduction -- 6.2 NN Regression -- 6.3 K-NN Classification -- 6.4 Preparing Data for K-NN -- 6.5 Locality-Sensitive Hashing (LSH) -- 6.6 Algorithms to Compute Nearest Neighbors -- 6.6.1 Brute Force -- 6.6.2 KD Tree
متن يادداشت
6.6.3 Ball Tree -- 6.7 Radius-Based Nearest Neighbor -- 6.8 Applications of NN in Biometrics -- 6.8.1 Brute Force Classification -- 6.8.2 State of the Art Applications of Nearest Neighbor -- 6.9 Conclusion -- 7 Dimensionality Reduction and Face Recognition -- 7.1 Introduction -- 7.2 About Principal Component Analysis (PCA) -- 7.2.1 PCA Algorithm -- 7.2.2 Capturing the Variability -- 7.2.3 Squared Reconstruction Error -- 7.3 Compressed Sensing -- 7.4 Kernel PCA -- 7.5 Application of PCA in Intrusion Detection -- 7.6 Biometrics -- 7.7 Face Recognition -- 7.8 Application of PCA in Face Recognition
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks.
ویراست دیگر از اثر در قالب دیگر رسانه
عنوان
Machine Learning Approaches in Cyber Security Analytics.
شماره استاندارد بين المللي کتاب و موسيقي
9789811517051
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Machine learning.
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Machine learning.
رده بندی ديویی
شماره
005
.
8
ويراست
23
رده بندی کنگره
شماره رده
QA76
.
9
.
A25
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )