LDR | | 05028cmm u2200625M 4500 |
001 | | 000000327892 |
003 | | OCoLC |
005 | | 20240307140820 |
006 | | m d |
007 | | cr ||||||||||| |
008 | | 230901s2023 flu o ||| 0 eng d |
015 | |
▼a GBC3G4772
▼2 bnb |
016 | 7 |
▼a 021191931
▼2 Uk |
019 | |
▼a 1400795674 |
020 | |
▼a 1000967581
▼q (electronic bk.) |
020 | |
▼a 9781000967586
▼q (electronic bk.) |
020 | |
▼a 9781003346340
▼q (electronic bk.) |
020 | |
▼a 1003346340
▼q (electronic bk.) |
020 | |
▼a 1000967557
▼q (electronic bk. : PDF) |
020 | |
▼a 9781000967555
▼q (electronic bk.) |
024 | 7 |
▼a 10.1201/9781003346340
▼2 doi |
035 | |
▼a 3669725
▼b (N$T) |
035 | |
▼a (OCoLC)1395539187
▼z (OCoLC)1400795674 |
037 | |
▼a 9781003346340
▼b Taylor & Francis |
040 | |
▼a YDX
▼b eng
▼c YDX
▼d TYFRS
▼d OCLCO
▼d UKMGB
▼d UKAHL
▼d N$T
▼d 248032 |
049 | |
▼a MAIN |
050 | 4 |
▼a TK5105.59 |
072 | 7 |
▼a COM
▼x 014000
▼2 bisacsh |
072 | 7 |
▼a COM
▼x 032000
▼2 bisacsh |
072 | 7 |
▼a UYQ
▼2 bicssc |
082 | 04 |
▼a 005.8/3
▼2 23/eng/20230912 |
245 | 00 |
▼a ARTIFICIAL INTELLIGENCE FOR INTRUSION DETECTION SYSTEMS
▼h [electronic resource]. |
260 | |
▼a BOCA RATON :
▼b CHAPMAN & HALL CRC,
▼c 2023. |
300 | |
▼a 1 online resource |
336 | |
▼a text
▼2 rdacontent |
336 | |
▼a still image
▼2 rdacontent |
337 | |
▼a computer
▼2 rdamedia |
338 | |
▼a online resource
▼2 rdacarrier |
504 | |
▼a Includes bibliographical references and index. |
520 | |
▼a This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS). Features: A systematic overview of the state-of-the-art IDS Proper explanation of novel cyber attacks which are much different from classical cyber attacks Proper and in-depth discussion of AI in the field of cybersecurity Introduction to design and architecture of novel AI-based IDS with a trans- parent view of real-time implementations Covers a wide variety of AI-based cyber defense mechanisms, especially in the field of network-based attacks, IoT-based attacks, multimedia attacks, and blockchain attacks. This book serves as a reference book for scientific investigators who need to analyze IDS, as well as researchers developing methodologies in this field. It may also be used as a textbook for a graduate-level course on information security. |
545 | 0 |
▼a Dr. Mayank Swarnkar is currently working as an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology (Banaras Hindu University) Varanasi. He completed his Ph.D. from the Indian Institute of Technology Indore in 2019. He completed his M.Tech in Wireless Communication and Computing from the Indian Institute of Information Technology Allahabad in 2013 and B.E. in IT from Government Engineering College Jabalpur in 2011. He also worked as Software Engineer at NEC Technologies India for 1 year from 2013 to 2014 and as Assistant Professor at Bennett University for 1 year from 2019 to 2020. His primary areas of interest are Network and System Security. He works mainly in the field of Network Traffic Classification, Zero Day Attacks, Intrusion Detection Systems, and VoIP Spam Detection. He has given many invited talks and he is a reviewer of many reputed conferences and journals. Dr. Shyam Singh Rajput received a B.E. degree in Computer Science & Engineering (CSE) from R. G. P.V., Bhopal, Madhya Pradesh, India, in 2011. He earned his M.Tech degree and Ph.D. degree in CSE from ABV-Indian Institute of Information Technology & Management (ABVIIITM), Gwalior, India, in 2013 and 2019, respec- tively. He has more than seven years of experience teaching undergraduate and post- graduate classes. Presently, he is working as an assistant professor in the Department of CSE, National Institute of Technology Patna, India. His current research interests include image processing, computer vision, and wireless networks. He has published more than 40 journal articles, conference papers, and book chapters in the domain of image processing, biometrics, wireless ad hoc networks, and information security. He has published three Indian patents and edited books with Elsevier and CRC Press. He is a member of IEEE and ACM. |
590 | |
▼a Added to collection customer.56279.3 |
650 | 0 |
▼a Intrusion detection systems (Computer security) |
650 | 0 |
▼a Artificial intelligence. |
650 | 6 |
▼a Syste?mes de de?tection d'intrusion (Se?curite? informatique) |
650 | 6 |
▼a Intelligence artificielle. |
650 | 7 |
▼a artificial intelligence.
▼2 aat |
650 | 7 |
▼a COMPUTERS / Computer Science
▼2 bisacsh |
650 | 7 |
▼a COMPUTERS / Information Technology
▼2 bisacsh |
700 | 1 |
▼a Swarnkar, Mayank,
▼e editor. |
700 | 1 |
▼a Rajput, Shyam Singh,
▼e editor. |
776 | 08 |
▼i Print version:
▼z 9781032386652 |
856 | 40 |
▼3 EBSCOhost
▼u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3669725 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 3669725 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b N$T |