Intrusion Detection : a data mining approach / Nandita Sengupta, Jaya Sil
Material type:
TextSeries: Cognitive Intelligence and RoboticsPublication details: Singapore: Springer, 2020.Description: 136 Pages; 23 cmISBN: - 9789811527180
- TK5105.59 .S476 2020
| Item type | Current library | Collection | Call number | Copy number | Status | Notes | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Rabdan Academy General Stacks | General Collection | TK5105.59 .S476 2020 (Browse shelf(Opens below)) | C. 1 | Available | AED 414.00 | 23303 |
Browsing Rabdan Academy shelves,Shelving location: General Stacks,Collection: General Collection Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| TK5105.59 .G85 2017 Cybersecurity : geopolitics, law and policy / | TK5105.59 .M592 2022 Methods, Implementation, and Application of Cyber Security Intelligence and Analytics / | TK5105.59 .M936 2014 Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions | TK5105.59 .S476 2020 Intrusion Detection : a data mining approach / | TK5105.59 .X87 2023 Cybersecurity in Intelligent Networking Systems / | TK5105.59 Z63 2020 Cross- Layer Design for Secure and Resilient Cyber- Physical Systems: a decision and game theoretic approach / | TK5105.875 .I57 H866 2020 Computer Networks and the Internet: a hands- on approach / |
This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.
There are no comments on this title.