000 | 03157nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-981-15-2716-6 | ||
003 | DE-He213 | ||
005 | 20240423125000.0 | ||
007 | cr nn 008mamaa | ||
008 | 200124s2020 si | s |||| 0|eng d | ||
020 |
_a9789811527166 _9978-981-15-2716-6 |
||
024 | 7 |
_a10.1007/978-981-15-2716-6 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
100 | 1 |
_aSengupta, Nandita. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aIntrusion Detection _h[electronic resource] : _bA Data Mining Approach / _cby Nandita Sengupta, Jaya Sil. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2020. |
|
300 |
_aXX, 136 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCognitive Intelligence and Robotics, _x2520-1964 |
|
505 | 0 | _aChapter 1. Introduction -- Chapter 2. Discretization -- Chapter 3. Data Reduction -- Chapter 4. Q-Learning Classifiers -- Chapter 5. Hierarchical Q - Learning Classifier -- Chapter 6. Conclusions and Future Research. | |
520 | _aThis book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security. | ||
650 | 0 | _aComputer networks . | |
650 | 0 | _aData protection. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCryptology. |
700 | 1 |
_aSil, Jaya. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811527159 |
776 | 0 | 8 |
_iPrinted edition: _z9789811527173 |
776 | 0 | 8 |
_iPrinted edition: _z9789811527180 |
830 | 0 |
_aCognitive Intelligence and Robotics, _x2520-1964 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-15-2716-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c172897 _d172897 |