0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Network Intrusion Detection using Deep Learning - A Feature Learning Approach (Paperback, 1st ed. 2018): Kwangjo Kim, Muhamad... Network Intrusion Detection using Deep Learning - A Feature Learning Approach (Paperback, 1st ed. 2018)
Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book. Offering a comprehensive overview of deep learning-based IDS, the book is a valuable reerence resource for undergraduate and graduate students, as well as researchers and practitioners interested in deep learning and intrusion detection. Further, the comparison of various deep-learning applications helps readers gain a basic understanding of machine learning, and inspires applications in IDS and other related areas in cybersecurity.

Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju... Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001. Proceedings (Paperback, 2001 ed.)
Kwangjo Kim
R1,645 Discovery Miles 16 450 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in Cheju Island, Korea in February 2001.The 30 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers address all current issues in public key cryptography, ranging from mathematical foundations to implementation issues.

Advances in Cryptology - ASIACRYPT '96 - International Conference on the Theory and Applications of Crypotology and... Advances in Cryptology - ASIACRYPT '96 - International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings (Paperback, 1996 ed.)
Kwangjo Kim, Tsutomu Matsumoto
R1,631 Discovery Miles 16 310 Ships in 10 - 15 working days

This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.
The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.

Privacy-Preserving Deep Learning - A Comprehensive Survey (Paperback, 1st ed. 2021): Kwangjo Kim, Harry Chandra Tanuwidjaja Privacy-Preserving Deep Learning - A Comprehensive Survey (Paperback, 1st ed. 2021)
Kwangjo Kim, Harry Chandra Tanuwidjaja
R2,009 Discovery Miles 20 090 Ships in 10 - 15 working days

This book discusses the state-of-the-art in privacy-preserving deep learning (PPDL), especially as a tool for machine learning as a service (MLaaS), which serves as an enabling technology by combining classical privacy-preserving and cryptographic protocols with deep learning. Google and Microsoft announced a major investment in PPDL in early 2019. This was followed by Google's infamous announcement of "Private Join and Compute," an open source PPDL tools based on secure multi-party computation (secure MPC) and homomorphic encryption (HE) in June of that year. One of the challenging issues concerning PPDL is selecting its practical applicability despite the gap between the theory and practice. In order to solve this problem, it has recently been proposed that in addition to classical privacy-preserving methods (HE, secure MPC, differential privacy, secure enclaves), new federated or split learning for PPDL should also be applied. This concept involves building a cloud framework that enables collaborative learning while keeping training data on client devices. This successfully preserves privacy and while allowing the framework to be implemented in the real world. This book provides fundamental insights into privacy-preserving and deep learning, offering a comprehensive overview of the state-of-the-art in PPDL methods. It discusses practical issues, and leveraging federated or split-learning-based PPDL. Covering the fundamental theory of PPDL, the pros and cons of current PPDL methods, and addressing the gap between theory and practice in the most recent approaches, it is a valuable reference resource for a general audience, undergraduate and graduate students, as well as practitioners interested learning about PPDL from the scratch, and researchers wanting to explore PPDL for their applications.

Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015,... Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
R2,864 Discovery Miles 28 640 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015. The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology.

Information Security and Cryptology - ICISC 2001 - 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings... Information Security and Cryptology - ICISC 2001 - 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings (Paperback, 2002 ed.)
Kwangjo Kim
R1,667 Discovery Miles 16 670 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Security and Cryptology, ICISC 2001, held in Seoul, Korea, in December 2001. The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 107 submissions. All current issues of cryptography and cryptanalysis and their applications to securing data, systems, and communications are addressed.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
We Were Perfect Parents Until We Had…
Vanessa Raphaely, Karin Schimke Paperback R330 R220 Discovery Miles 2 200
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Harry Potter Wizard Wand - In…
 (3)
R800 Discovery Miles 8 000
Bad Boy Men's Smoke Watch & Sunglass Set…
 (3)
R489 Discovery Miles 4 890
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Efekto 77300-G Nitrile Gloves (L)(Green)
R63 Discovery Miles 630
Kindle Paperwhite 6.8" 11th Gen 2021…
R4,999 R4,499 Discovery Miles 44 990
Atmosfire
Jan Braai Hardcover R590 R425 Discovery Miles 4 250
Cadac Pizza Stone (33cm)
 (18)
R398 Discovery Miles 3 980
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840

 

Partners