Machine Learning in Cyber Trust (Record no. 59397)

MARC details
000 -LEADER
fixed length control field 04927nam a22004455i 4500
001 - CONTROL NUMBER
control field 978-0-387-88735-7
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251006084429.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2009 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780387887357
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 99780387887357
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-0-387-88735-7
Source of number or code doi
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Yu, Philip S.
Relator term editor.
245 10 - TITLE STATEMENT
Title Machine Learning in Cyber Trust
Medium [electronic resource] :
Remainder of title Security, Privacy, and Reliability /
Statement of responsibility, etc. edited by Philip S. Yu, Jeffrey J. P. Tsai.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boston, MA :
Name of producer, publisher, distributor, manufacturer Springer US,
Date of production, publication, distribution, manufacture, or copyright notice 2009.
300 ## - PHYSICAL DESCRIPTION
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cyber System -- Cyber-Physical Systems: A New Frontier -- Security -- Misleading Learners: Co-opting Your Spam Filter -- Survey of Machine Learning Methods for Database Security -- Identifying Threats Using Graph-based Anomaly Detection -- On the Performance of Online Learning Methods for Detecting Malicious Executables -- Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems -- A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features -- Image Encryption and Chaotic Cellular Neural Network -- Privacy -- From Data Privacy to Location Privacy -- Privacy Preserving Nearest Neighbor Search -- Reliability -- High-Confidence Compositional Reliability Assessment of SOA-Based Systems Using Machine Learning Techniques -- Model, Properties, and Applications of Context-Aware Web Services.
520 ## - SUMMARY, ETC.
Summary, etc. Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms. This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work. Specific features include the following: A survey of various approaches using machine learning/data mining techniques to enhance the traditional security mechanisms of databases A discussion of detection of SQL Injection attacks and anomaly detection for defending against insider threats An approach to detecting anomalies in a graph-based representation of the data collected during the monitoring of cyber and other infrastructures An empirical study of seven online-learning methods on the task of detecting malicious executables A novel network intrusion detection framework for mining and detecting sequential intrusion patterns A solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems An image encryption algorithm based on a chaotic cellular neural network to deal with information security and assurance An overview of data privacy research, examining the achievements, challenges and opportunities while pinpointing individual research efforts on the grand map of data privacy protection An algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data An approach for assessing the reliability of SOA-based systems using AI reasoning techniques The models, properties, and applications of context-aware Web services, including an ontology-based context model to enable formal description and acquisition of contextual information pertaining to service requestors and services Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SCIENCE.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element DATA PROTECTION.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element DATA MINING.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element ARTIFICIAL INTELLIGENCE.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SCIENCE.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element ARTIFICIAL INTELLIGENCE (INCL. ROBOTICS).
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element DATA MINING AND KNOWLEDGE DISCOVERY.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element SYSTEMS AND DATA SECURITY.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tsai, Jeffrey J. P.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9780387887340
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://dx.doi.org/10.1007/978-0-387-88735-7">http://dx.doi.org/10.1007/978-0-387-88735-7</a>
Public note Ver el texto completo en las instalaciones del CICY
912 ## -
-- ZDB-2-SCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Libros electrónicos
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Total checkouts Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Libro electrónico CICY CICY Libro electrónico 06.10.2025   06.10.2025 06.10.2025 Libros electrónicos