|
|
Showing 1 - 8 of
8 matches in All Departments
This book explores new and novel applications of machine learning,
deep learning, and artificial intelligence that are related to
major challenges in the field of cybersecurity. The provided
research goes beyond simply applying AI techniques to datasets and
instead delves into deeper issues that arise at the interface
between deep learning and cybersecurity. This book also provides
insight into the difficult "how" and "why" questions that arise in
AI within the security domain. For example, this book includes
chapters covering "explainable AI", "adversarial learning",
"resilient AI", and a wide variety of related topics. It's not
limited to any specific cybersecurity subtopics and the chapters
touch upon a wide range of cybersecurity domains, ranging from
malware to biometrics and more. Researchers and advanced level
students working and studying in the fields of cybersecurity
(equivalently, information security) or artificial intelligence
(including deep learning, machine learning, big data, and related
fields) will want to purchase this book as a reference.
Practitioners working within these fields will also be interested
in purchasing this book.
This book is focused on the use of deep learning (DL) and
artificial intelligence (AI) as tools to advance the fields of
malware detection and analysis. The individual chapters of the book
deal with a wide variety of state-of-the-art AI and DL techniques,
which are applied to a number of challenging malware-related
problems. DL and AI based approaches to malware detection and
analysis are largely data driven and hence minimal expert domain
knowledge of malware is needed. This book fills a gap between the
emerging fields of DL/AI and malware analysis. It covers a broad
range of modern and practical DL and AI techniques, including
frameworks and development tools enabling the audience to innovate
with cutting-edge research advancements in a multitude of malware
(and closely related) use cases.
Introduction to Machine Learning with Applications in Information
Security, Second Edition provides a classroom-tested introduction
to a wide variety of machine learning and deep learning algorithms
and techniques, reinforced via realistic applications. The book is
accessible and doesn't prove theorems, or dwell on mathematical
theory. The goal is to present topics at an intuitive level, with
just enough detail to clarify the underlying concepts. The book
covers core classic machine learning topics in depth, including
Hidden Markov Models (HMM), Support Vector Machines (SVM), and
clustering. Additional machine learning topics include k-Nearest
Neighbor (k-NN), boosting, Random Forests, and Linear Discriminant
Analysis (LDA). The fundamental deep learning topics of
backpropagation, Convolutional Neural Networks (CNN), Multilayer
Perceptrons (MLP), and Recurrent Neural Networks (RNN) are covered
in depth. A broad range of advanced deep learning architectures are
also presented, including Long Short-Term Memory (LSTM), Generative
Adversarial Networks (GAN), Extreme Learning Machines (ELM),
Residual Networks (ResNet), Deep Belief Networks (DBN),
Bidirectional Encoder Representations from Transformers (BERT), and
Word2Vec. Finally, several cutting-edge deep learning topics are
discussed, including dropout regularization, attention,
explainability, and adversarial attacks. Most of the examples in
the book are drawn from the field of information security, with
many of the machine learning and deep learning applications focused
on malware. The applications presented serve to demystify the
topics by illustrating the use of various learning techniques in
straightforward scenarios. Some of the exercises in this book
require programming, and elementary computing concepts are assumed
in a few of the application sections. However, anyone with a modest
amount of computing experience should have no trouble with this
aspect of the book. Instructor resources, including PowerPoint
slides, lecture videos, and other relevant material are provided on
an accompanying website: http://www.cs.sjsu.edu/~stamp/ML/.
This book explores new and novel applications of machine learning,
deep learning, and artificial intelligence that are related to
major challenges in the field of cybersecurity. The provided
research goes beyond simply applying AI techniques to datasets and
instead delves into deeper issues that arise at the interface
between deep learning and cybersecurity. This book also provides
insight into the difficult "how" and "why" questions that arise in
AI within the security domain. For example, this book includes
chapters covering "explainable AI", "adversarial learning",
"resilient AI", and a wide variety of related topics. It’s not
limited to any specific cybersecurity subtopics and the chapters
touch upon a wide range of cybersecurity domains, ranging from
malware to biometrics and more. Researchers and advanced level
students working and studying in the fields of cybersecurity
(equivalently, information security) or artificial intelligence
(including deep learning, machine learning, big data, and related
fields) will want to purchase this book as a reference.
Practitioners working within these fields will also be interested
in purchasing this book.
This book is focused on the use of deep learning (DL) and
artificial intelligence (AI) as tools to advance the fields of
malware detection and analysis. The individual chapters of the book
deal with a wide variety of state-of-the-art AI and DL techniques,
which are applied to a number of challenging malware-related
problems. DL and AI based approaches to malware detection and
analysis are largely data driven and hence minimal expert domain
knowledge of malware is needed. This book fills a gap between the
emerging fields of DL/AI and malware analysis. It covers a broad
range of modern and practical DL and AI techniques, including
frameworks and development tools enabling the audience to innovate
with cutting-edge research advancements in a multitude of malware
(and closely related) use cases.
At its core, information security deals with the secure and
accurate transfer of information. While information security has
long been important, it was, perhaps, brought more clearly into
mainstream focus with the so-called "Y2K" issue. Te Y2K scare was
the fear that c- puter networks and the systems that are controlled
or operated by sofware would fail with the turn of the millennium,
since their clocks could lose synchronization by not recognizing a
number (instruction) with three zeros. A positive outcome of this
scare was the creation of several Computer Emergency Response Teams
(CERTs) around the world that now work - operatively to exchange
expertise and information, and to coordinate in case major problems
should arise in the modern IT environment. Te terrorist attacks of
11 September 2001 raised security concerns to a new level. Te -
ternational community responded on at least two fronts; one front
being the transfer of reliable information via secure networks and
the other being the collection of information about - tential
terrorists. As a sign of this new emphasis on security, since 2001,
all major academic publishers have started technical journals
focused on security, and every major communi- tions conference (for
example, Globecom and ICC) has organized workshops and sessions on
security issues. In addition, the IEEE has created a technical
committee on Communication and Information Security. Te ?rst editor
was intimately involved with security for the Athens Olympic Games
of 2004.
At its core, information security deals with the secure and
accurate transfer of information. While information security has
long been important, it was, perhaps, brought more clearly into
mainstream focus with the so-called "Y2K" issue. Te Y2K scare was
the fear that c- puter networks and the systems that are controlled
or operated by sofware would fail with the turn of the millennium,
since their clocks could lose synchronization by not recognizing a
number (instruction) with three zeros. A positive outcome of this
scare was the creation of several Computer Emergency Response Teams
(CERTs) around the world that now work - operatively to exchange
expertise and information, and to coordinate in case major problems
should arise in the modern IT environment. Te terrorist attacks of
11 September 2001 raised security concerns to a new level. Te -
ternational community responded on at least two fronts; one front
being the transfer of reliable information via secure networks and
the other being the collection of information about - tential
terrorists. As a sign of this new emphasis on security, since 2001,
all major academic publishers have started technical journals
focused on security, and every major communi- tions conference (for
example, Globecom and ICC) has organized workshops and sessions on
security issues. In addition, the IEEE has created a technical
committee on Communication and Information Security. Te ?rst editor
was intimately involved with security for the Athens Olympic Games
of 2004.
Introduction to Machine Learning with Applications in Information
Security provides a class-tested introduction to a wide variety of
machine learning algorithms, reinforced through realistic
applications. The book is accessible and doesn't prove theorems, or
otherwise dwell on mathematical theory. The goal is to present
topics at an intuitive level, with just enough detail to clarify
the underlying concepts. The book covers core machine learning
topics in-depth, including Hidden Markov Models, Principal
Component Analysis, Support Vector Machines, and Clustering. It
also includes coverage of Nearest Neighbors, Neural Networks,
Boosting and AdaBoost, Random Forests, Linear Discriminant
Analysis, Vector Quantization, Naive Bayes, Regression Analysis,
Conditional Random Fields, and Data Analysis. Most of the examples
in the book are drawn from the field of information security, with
many of the machine learning applications specifically focused on
malware. The applications presented are designed to demystify
machine learning techniques by providing straightforward scenarios.
Many of the exercises in this book require some programming, and
basic computing concepts are assumed in a few of the application
sections. However, anyone with a modest amount of programming
experience should have no trouble with this aspect of the book.
Instructor resources, including PowerPoint slides, lecture videos,
and other relevant material are provided on an accompanying
website: http://www.cs.sjsu.edu/~stamp/ML/. For the reader's
benefit, the figures in the book are also available in electronic
form, and in color. About the Author Mark Stamp has been a
Professor of Computer Science at San Jose State University since
2002. Prior to that, he worked at the National Security Agency
(NSA) for seven years, and a Silicon Valley startup company for two
years. He received his Ph.D. from Texas Tech University in 1992.
His love affair with machine learning began in the early 1990s,
when he was working at the NSA, and continues today at SJSU, where
he has supervised vast numbers of master's student projects, most
of which involve a combination of information security and machine
learning.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|