Artificial Intelligence and Data Mining Approaches in Security Frameworks

Здесь есть возможность читать онлайн «Artificial Intelligence and Data Mining Approaches in Security Frameworks» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Artificial Intelligence and Data Mining Approaches in Security Frameworks: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Artificial Intelligence and Data Mining Approaches in Security Frameworks»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Artificial intelligence (AI) and data mining is the fastest growing field in computer science. AI and data mining algorithms and techniques are found to be useful in different areas like pattern recognition, automatic threat detection, automatic problem solving, visual recognition, fraud detection, detecting developmental delay in children, and many other applications. However, applying AI and data mining techniques or algorithms successfully in these areas needs a concerted effort, fostering integrative research between experts ranging from diverse disciplines from data science to Artificial Intelligence. Successful application of security frameworks to enable meaningful, cost effective, personalize security service is a primary aim of engineers and researchers today. However realizing this goal requires effective understanding, application and amalgamation of AI and Data Mining and several other computing technologies to deploy such system in an effective manner.
This book provides state of the art approaches of artificial intelligence and data mining in these areas. It includes areas of detection, prediction, as well as future framework identification, development, building service systems and analytical aspects. In all these topics, applications of AI and data mining, such as artificial neural networks, fuzzy logic, genetic algorithm and hybrid mechanisms, are explained and explored. This book is aimed at the modeling and performance prediction of efficient security framework systems, bringing to light a new dimension in the theory and practice. 
This groundbreaking new volume presents these topics and trends, bridging the research gap on AI and data mining to enable wide-scale implementation. Whether for the veteran engineer or the student, this is a must-have for any library.

Artificial Intelligence and Data Mining Approaches in Security Frameworks — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Artificial Intelligence and Data Mining Approaches in Security Frameworks», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

11 Chapter 11Figure 11.1 Conventional system for cyber security.Figure 11.2 Cyber security with supervised and unsupervised machine learning.Figure 11.3 Cyber-attack attribution rules through association rule mining.Figure 11.4 Supervised learning (Classification) and Unsupervised learning (Clus...Figure 11.5 Different stages for detecting cyber attack through data mining.

12 Chapter 12Figure 12.1 Intrusion detection system.Figure 12.2 Web-based intrusion detection system.Figure 12.3 Host-based Intrusion Detection SystemFigure 12.4 Application Protocol-based Intrusion Detection System (APIDS).Figure 12.5 Hybrid intrusion detection system.Figure 12.6 Misuse detection expert system (MDES).Figure 12.7 Signature-based analysis in IDS.Figure 12.8 Data mining in intrusion detection system.Figure 12.9 Classification tree.Figure 12.10 Regression tree.Figure 12.11 Model of modified decision tree algorithm.Figure 12.12 Stream of attack detection.

13 Chapter 13Figure 13.1 The Architecture of the experimental framework.Figure 13.2 Scatter plot of the collected data.Figure 13.3 Output GUI with sample output.Figure 13.4 Flowchart for the firefly algorithm ( Singh Rathore, P. et al. 2020 ).Figure 13.5 Blood pressure measuring GUI.Figure 13.6 Heart Rate measurement GUI.Figure 13.7 Oxygen measurement GUI.Figure 13.8 Warning message GUI.Figure 13.9 Cloud database value.Figure 13.10 GUI for optimal, best and worst parameters.

14 Chapter 14Figure 14.1 Gesture recognition product growth over Asia-Pacific regions (Source...Figure 14.2 Gesture classification.Figure 14.3 (a) Operations in Image Enhancement (b) Hand gestures in the process...Figure 14.4 Image acquisition taxonomy.Figure 14.5 Vision controlled remote (www.zdnet.com).

15 Chapter 15Figure 15.1 The capacity of spam emails 4th zone 2018 to 1st area 2019.Figure 15.2 Representation of an email server structure and process of spam filt...Figure 15.3 Structure of neural network (NN).Figure 15.4 Fuzzy set e-mail filtering manner workflow from person mailbox.

List of Tables

1 Chapter 1Table 4.1 Aspect of machine learning method in botnet detection system.

2 Chapter 8Table 8.1 Sample of featured extraction using ILBP method.Table 8.2 Comparison table.

3 Chapter 11Table 11.1 Common cyber attacks and their description.Table 11.2 Popular Data Mining Tools for cyber security.

4 Chapter 12Table 12.1 IDS type comparative.

5 Chapter 14Table 14.1 Comparison of classifiers.Table 14.2 Comparison of exiting vision based.

6 Chapter 15Table 15.1 Freely available email spam collection.

Guide

1 Cover

2 Table of Contents

3 Title Page

4 Preface

5 Copyright

6 Begin Reading

7 About the Editors

8 Index

9 End User License Agreement

Pages

1 v

2 ii

3 iii

4 iv

5 xiii

6 xiv

7 xv

8 xvi

9 xvii

10 1

11 2

12 3

13 4

14 5

15 6

16 7

17 8

18 9

19 11

20 12

21 13

22 14

23 15

24 16

25 17

26 18

27 19

28 20

29 21

30 22

31 23

32 24

33 25

34 26

35 27

36 28

37 29

38 30

39 31

40 33

41 34

42 35

43 36

44 37

45 38

46 39

47 40

48 41

49 42

50 43

51 44

52 45

53 46

54 47

55 48

56 49

57 50

58 51

59 52

60 53

61 54

62 55

63 56

64 57

65 58

66 59

67 60

68 61

69 62

70 63

71 65

72 66

73 67

74 68

75 69

76 70

77 71

78 72

79 73

80 74

81 75

82 76

83 77

84 78

85 79

86 80

87 81

88 82

89 83

90 84

91 85

92 87

93 88

94 89

95 90

96 91

97 92

98 93

99 94

100 95

101 96

102 97

103 98

104 99

105 101

106 102

107 103

108 104

109 105

110 106

111 107

112 108

113 109

114 110

115 111

116 112

117 113

118 114

119 115

120 116

121 117

122 119

123 120

124 121

125 122

126 123

127 124

128 125

129 126

130 127

131 128

132 129

133 130

134 131

135 132

136 133

137 134

138 135

139 136

140 137

141 138

142 139

143 140

144 141

145 142

146 143

147 144

148 145

149 146

150 147

151 148

152 149

153 150

154 151

155 152

156 153

157 154

158 155

159 156

160 157

161 158

162 159

163 160

164 161

165 162

166 163

167 164

168 165

169 166

170 167

171 168

172 169

173 170

174 171

175 173

176 174

177 175

178 176

179 177

180 178

181 179

182 180

183 181

184 182

185 183

186 184

187 185

188 186

189 187

190 188

191 189

192 190

193 191

194 192

195 193

196 194

197 195

198 196

199 197

200 198

201 199

202 200

203 201

204 202

205 203

206 204

207 205

208 206

209 207

210 209

211 210

212 211

213 212

214 213

215 214

216 215

217 216

218 217

219 218

220 219

221 220

222 221

223 222

224 223

225 224

226 225

227 226

228 227

229 229

230 230

231 231

232 232

233 233

234 234

235 235

236 236

237 237

238 238

239 239

240 240

241 241

242 242

243 243

244 244

245 245

246 247

247 248

248 249

249 250

250 251

251 252

252 253

253 254

254 255

255 256

256 257

257 258

258 259

259 260

260 261

261 262

262 263

263 264

264 265

265 266

266 267

267 268

268 269

269 270

270 271

271 272

272 273

273 274

274 275

275 276

276 277

277 278

278 279

279 280

280 281

281 282

282 283

283 284

284 285

285 286

286 287

287 288

288 289

289 290

290 291

291 293

292 294

293 295

294 296

295 297

Scrivener Publishing100 Cummings Center, Suite 541J Beverly, MA 01915-6106

Advances in Cyber Security

Series Editor: Rashmi Agrawal and D. Ganesh Gopal

Scope: The purpose of this book series is to present books that are specifically designed to address the critical security challenges in today’s computing world including cloud and mobile environments and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography, blockchain and other defense mechanisms. The book series presents some of the state-of-the-art research work in the field of blockchain, cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of blockchain, cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities. The book series provides a comprehensive look at the various facets of cloud security: infrastructure, network, services, compliance and users. It will provide real-world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a security perspective. The book series will serve as a platform for books dealing with security concerns of decentralized applications (DApps) and smart contracts that operate on an open blockchain. The book series will be a comprehensive and up-to-date reference on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Artificial Intelligence and Data Mining Approaches in Security Frameworks»

Представляем Вашему вниманию похожие книги на «Artificial Intelligence and Data Mining Approaches in Security Frameworks» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Artificial Intelligence and Data Mining Approaches in Security Frameworks»

Обсуждение, отзывы о книге «Artificial Intelligence and Data Mining Approaches in Security Frameworks» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x