Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
This book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the basics of machine learning and deep learning. Interpretation of statistics and probability theory will be a plus but is not certainly vital for identifying most of the book's material.
This book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the basics of machine learning and deep learning. Interpretation of statistics and probability theory will be a plus but is not certainly vital for identifying most of the book's material.
|
You may like...
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn
Paperback
(5)
|