Intrusion Detection : (Record no. 6820)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01496nam a22001817a 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250109b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9789811527180 |
| 050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | TK5105.59 |
| Item number | .S476 2020 |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Sengupta, Nandita |
| 245 ## - TITLE STATEMENT | |
| Title | Intrusion Detection : |
| Remainder of title | a data mining approach / |
| Statement of responsibility, etc | Nandita Sengupta, Jaya Sil |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Singapore: |
| Name of publisher, distributor, etc | Springer, |
| Date of publication, distribution, etc | 2020. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 136 Pages; |
| Dimensions | 23 cm. |
| 440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE | |
| Title | Cognitive Intelligence and Robotics. |
| 521 ## - TARGET AUDIENCE NOTE | |
| Target audience note | This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Intrusion Detection Systems. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data Mining. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Library of Congress Classification |
| Item type | Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type | Public note |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Library of Congress Classification | General Collection | Rabdan Academy | Rabdan Academy | General Stacks | 01/09/2025 | UBH | 414.00 | TK5105.59 .S476 2020 | 23303 | 01/09/2025 | C. 1 | 01/09/2025 | Books | AED 414.00 |