Intelligent approaches to cyber security. (2023)
- Record Type:
- Book
- Title:
- Intelligent approaches to cyber security. (2023)
- Main Title:
- Intelligent approaches to cyber security
- Further Information:
- Note: Edited by Narendra Shekokar, Hari Vasudevan, Surya Durbha, Antonis Michalas, Tatwadarshi P. Nagarhalli.
- Editors:
- Shekokar, Narendra M
Vasudevan, Hari, 1969-
Durbha, Surya Srinivas
Michalas, Antonis
Nagarhalli, Tatwadarshi P - Contents:
- Section 1: Introduction to ML in Cyber Security Introduction and Importance of ML techniques in Cyber Security Dr. Mrs Gresha Bhatia1, Dr. Narendra M. Shekokar2 and Dr. Tatwadarshi P. Nagarhalli3 Review of Machine Learning approaches in the Field of Healthcare Uttara Gogate and Ms. Harshita Bhagwat Scope of Machine Learning and Blockchain in Cyber Security Rohini Patil1, Monika Mangla, Smita Bansod Section 2: Defending Cyber Attack using Machine Learning Detection of Spear Phishing using Natural Language Processing Deep Gandhi, Jash Mehta, Ramchandra Mangrulkar A Study of Recent Techniques to detect zero-day Phishing attacks Sharvari Patil and Dr. Narendra M. Shekokar Analysis of Intelligent techniques for Financial Fraud detection Narendra Shekokar, Aditi Vora Evaluation of Learning Techniques for Intrusion Detection System Dr. Tatwadarshi P. Nagarhalli, Dr. Ashwini M. Save and Dr. Narendra M. Shekokar Section 3: Defending Cyber Attack using Deep Learning Deep Neural Networks for Cybersecurity Bhavi Dave, Prof. Aruna Gawade Deep Learning in Malware Identification and Classification Amruta Hingmire, Jyoti Mante, Priyanka Bhatele, Swati Sinha, Swati Jadhav, Pallavi Shimpi, Dr. Uma Pujeri Section 4: Defending Cyber Attack using Advance Technology Cyber threat mitigation using Machine Learning, Deep Learning, Artificial Intelligence, and Blockchain Snehal Paddalwar, Leena Ragha, Vanita Mane Behavioral Monitor and Blocker of a Cyber Malware using Block chain, Machine learningSection 1: Introduction to ML in Cyber Security Introduction and Importance of ML techniques in Cyber Security Dr. Mrs Gresha Bhatia1, Dr. Narendra M. Shekokar2 and Dr. Tatwadarshi P. Nagarhalli3 Review of Machine Learning approaches in the Field of Healthcare Uttara Gogate and Ms. Harshita Bhagwat Scope of Machine Learning and Blockchain in Cyber Security Rohini Patil1, Monika Mangla, Smita Bansod Section 2: Defending Cyber Attack using Machine Learning Detection of Spear Phishing using Natural Language Processing Deep Gandhi, Jash Mehta, Ramchandra Mangrulkar A Study of Recent Techniques to detect zero-day Phishing attacks Sharvari Patil and Dr. Narendra M. Shekokar Analysis of Intelligent techniques for Financial Fraud detection Narendra Shekokar, Aditi Vora Evaluation of Learning Techniques for Intrusion Detection System Dr. Tatwadarshi P. Nagarhalli, Dr. Ashwini M. Save and Dr. Narendra M. Shekokar Section 3: Defending Cyber Attack using Deep Learning Deep Neural Networks for Cybersecurity Bhavi Dave, Prof. Aruna Gawade Deep Learning in Malware Identification and Classification Amruta Hingmire, Jyoti Mante, Priyanka Bhatele, Swati Sinha, Swati Jadhav, Pallavi Shimpi, Dr. Uma Pujeri Section 4: Defending Cyber Attack using Advance Technology Cyber threat mitigation using Machine Learning, Deep Learning, Artificial Intelligence, and Blockchain Snehal Paddalwar, Leena Ragha, Vanita Mane Behavioral Monitor and Blocker of a Cyber Malware using Block chain, Machine learning and VAPT Sulakshana Bhausaheb Mane, M.Z.Shaikh, Mangesh M. Ghonge Quantum Safe Cryptography Kunal Mohan Meher … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : Chapman & Hall/CRC
- Publication Date:
- 2023
- Extent:
- 1 online resource (196 pages), illustrations (black and white)
- Subjects:
- 005.8
Computer security
Computer networks -- Security measures
Machine learning -- Security measures
Deep learning (Machine learning) -- Security measures
Blockchains (Databases) -- Security measures - Languages:
- English
- ISBNs:
- 9781000961652
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.812472
- Ingest File:
- 21_029.xml