|
Showing 1 - 4 of
4 matches in All Departments
More frequent and complex cyber threats require robust, automated
and rapid responses from cyber security specialists. This book
offers a complete study in the area of graph learning in cyber,
emphasising graph neural networks (GNNs) and their cyber security
applications. Three parts examine the basics; methods and
practices; and advanced topics. The first part presents a grounding
in graph data structures and graph embedding and gives a taxonomic
view of GNNs and cyber security applications. Part two explains
three different categories of graph learning including
deterministic, generative and reinforcement learning and how they
can be used for developing cyber defence models. The discussion of
each category covers the applicability of simple and complex
graphs, scalability, representative algorithms and technical
details. Undergraduate students, graduate students, researchers,
cyber analysts, and AI engineers looking to understand practical
deep learning methods will find this book an invaluable resource.
More frequent and complex cyber threats require robust, automated
and rapid responses from cyber security specialists. This book
offers a complete study in the area of graph learning in cyber,
emphasising graph neural networks (GNNs) and their cyber security
applications. Three parts examine the basics; methods and
practices; and advanced topics. The first part presents a grounding
in graph data structures and graph embedding and gives a taxonomic
view of GNNs and cyber security applications. Part two explains
three different categories of graph learning including
deterministic, generative and reinforcement learning and how they
can be used for developing cyber defence models. The discussion of
each category covers the applicability of simple and complex
graphs, scalability, representative algorithms and technical
details. Undergraduate students, graduate students, researchers,
cyber analysts, and AI engineers looking to understand practical
deep learning methods will find this book an invaluable resource.
This book states that the major aim audience are people who have
some familiarity with Internet of things (IoT) but interested to
get a comprehensive interpretation of the role of deep Learning in
maintaining the security and privacy of IoT. A reader should be
friendly with Python and the basics of machine learning and deep
learning. Interpretation of statistics and probability theory will
be a plus but is not certainly vital for identifying most of the
book's material.
This book states that the major aim audience are people who have
some familiarity with Internet of things (IoT) but interested to
get a comprehensive interpretation of the role of deep Learning in
maintaining the security and privacy of IoT. A reader should be
friendly with Python and the basics of machine learning and deep
learning. Interpretation of statistics and probability theory will
be a plus but is not certainly vital for identifying most of the
book's material.
|
|