語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
Introduction to machine learning with applications in information security
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Introduction to machine learning with applications in information security/ Mark Stamp.
作者:
Stamp, Mark.
出版者:
Boca Raton, FL :CRC Press, : 2023.,
面頁冊數:
1 online resource.
標題:
Information networks - Security measures. -
電子資源:
https://www.taylorfrancis.com/books/9781003264873
ISBN:
9781003264873
Introduction to machine learning with applications in information security
Stamp, Mark.
Introduction to machine learning with applications in information security
[electronic resource] /Mark Stamp. - 2nd ed. - Boca Raton, FL :CRC Press,2023. - 1 online resource. - Chapman & Hall/CRC machine learning & pattern recognition. - Chapman & Hall/CRC machine learning & pattern recognition..
Includes bibliographical references and index.
"Introduction to Machine Learning with Applications in Information Security, Second Edition provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, reinforced via realistic applications. The book is accessible and doesn't prove theorems, or dwell on mathematical theory. The goal is to present topics at an intuitive level, with just enough detail to clarify the underlying concepts. The book covers core classic machine learning topics in depth, including Hidden Markov Models (HMM), Support Vector Machines (SVM), and clustering. Additional machine learning topics include k-Nearest Neighbor (k-NN), boosting, Random Forests, and Linear Discriminant Analysis (LDA). The fundamental deep learning topics of backpropagation, Convolutional Neural Networks (CNN), Multilayer Perceptrons (MLP), and Recurrent Neural Networks (RNN) are covered in depth. A broad range of advanced deep learning architectures are also presented, including Long Short-Term Memory (LSTM), Generative Adversarial Networks (GAN), Extreme Learning Machines (ELM), Residual Networks (ResNet), Deep Belief Networks (DBN), Bidirectional Encoder Representations from Transformers (BERT), and Word2Vec. Finally, several cutting-edge deep learning topics are discussed, including dropout regularization, attention, explainability, and adversarial attacks. Most of the examples in the book are drawn from the field of information security, with many of the machine learning and deep learning applications focused on malware. The applications presented serve to demystify the topics by illustrating the use of various learning techniques in straightforward scenarios. Some of the exercises in this book require programming, and elementary computing concepts are assumed in a few of the application sections. However, anyone with a modest amount of computing experience should have no trouble with this aspect of the book"--
ISBN: 9781003264873
LCCN: 2022007073Subjects--Topical Terms:
913154
Information networks
--Security measures.
LC Class. No.: TK5105.59 / .S735 2022
Dewey Class. No.: 005.8
Introduction to machine learning with applications in information security
LDR
:02945cmm a2200289 a 4500
001
2373129
005
20240923072503.0
006
m o d
007
cr cnu---unuuu
008
241205s2023 flu ob 001 0 eng
010
$a
2022007073
020
$a
9781003264873
$q
(electronic bk.)
020
$z
9781032207179
$q
(pbk.)
020
$z
9781032204925
$q
(hbk.)
035
$a
22425912
040
$a
DLC
$b
eng
$c
DLC
041
0
$a
eng
050
0 0
$a
TK5105.59
$b
.S735 2022
082
0 0
$a
005.8
$2
23
100
1
$a
Stamp, Mark.
$3
1085971
245
1 0
$a
Introduction to machine learning with applications in information security
$h
[electronic resource] /
$c
Mark Stamp.
250
$a
2nd ed.
260
$a
Boca Raton, FL :
$b
CRC Press,
$c
2023.
300
$a
1 online resource.
490
1
$a
Chapman & Hall/CRC machine learning & pattern recognition
504
$a
Includes bibliographical references and index.
520
$a
"Introduction to Machine Learning with Applications in Information Security, Second Edition provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, reinforced via realistic applications. The book is accessible and doesn't prove theorems, or dwell on mathematical theory. The goal is to present topics at an intuitive level, with just enough detail to clarify the underlying concepts. The book covers core classic machine learning topics in depth, including Hidden Markov Models (HMM), Support Vector Machines (SVM), and clustering. Additional machine learning topics include k-Nearest Neighbor (k-NN), boosting, Random Forests, and Linear Discriminant Analysis (LDA). The fundamental deep learning topics of backpropagation, Convolutional Neural Networks (CNN), Multilayer Perceptrons (MLP), and Recurrent Neural Networks (RNN) are covered in depth. A broad range of advanced deep learning architectures are also presented, including Long Short-Term Memory (LSTM), Generative Adversarial Networks (GAN), Extreme Learning Machines (ELM), Residual Networks (ResNet), Deep Belief Networks (DBN), Bidirectional Encoder Representations from Transformers (BERT), and Word2Vec. Finally, several cutting-edge deep learning topics are discussed, including dropout regularization, attention, explainability, and adversarial attacks. Most of the examples in the book are drawn from the field of information security, with many of the machine learning and deep learning applications focused on malware. The applications presented serve to demystify the topics by illustrating the use of various learning techniques in straightforward scenarios. Some of the exercises in this book require programming, and elementary computing concepts are assumed in a few of the application sections. However, anyone with a modest amount of computing experience should have no trouble with this aspect of the book"--
$c
Provided by publisher.
588
$a
Description based on print version record.
650
0
$a
Information networks
$x
Security measures.
$3
913154
650
0
$a
Machine learning.
$3
533906
830
0
$a
Chapman & Hall/CRC machine learning & pattern recognition.
$3
3720492
856
4 0
$u
https://www.taylorfrancis.com/books/9781003264873
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9493915
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .S735 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入