Machine Learning in Cyber Trust: Security, Privacy, and Reliability
Sold by Lucky's Textbooks, Dallas, TX, U.S.A.
AbeBooks Seller since 22 July 2022
New - Soft cover
Condition: New
Quantity: Over 20 available
Add to basketSold by Lucky's Textbooks, Dallas, TX, U.S.A.
AbeBooks Seller since 22 July 2022
Condition: New
Quantity: Over 20 available
Add to basketMany networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.
This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.
Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.
Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.
This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work.
Specific features include the following:
Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.
"About this title" may belong to another edition of this title.
We guarantee the condition of every book as it's described on the AbeBooks web
sites. Please note that used items may not include access codes or cards, CD's
or other accessories, regardless of what is stated in item title. If you need to
guarantee that these items are included, please purchase a brand new copy.
All requests for refunds and/or returns will be processed in accordance with
AbeBooks policies. If you're dissatisfied with your purchase (Incorrect Book/Not
as Described/Damaged) or if ...
Books ordered via expedited shipping should arrive between 2 and 7 business days after shipment confirmation. Books ordered via standard shipping should arrive between 4 and 14 business days after shipment confirmation.