Cantitate/Preț
Produs

Intrusion Detection: A Data Mining Approach: Cognitive Intelligence and Robotics

Autor Nandita Sengupta, Jaya Sil
en Limba Engleză Hardback – 25 ian 2020
This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion.
The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.


Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 96035 lei  6-8 săpt.
  Springer Nature Singapore – 25 ian 2021 96035 lei  6-8 săpt.
Hardback (1) 96634 lei  6-8 săpt.
  Springer Nature Singapore – 25 ian 2020 96634 lei  6-8 săpt.

Din seria Cognitive Intelligence and Robotics

Preț: 96634 lei

Preț vechi: 120792 lei
-20% Nou

Puncte Express: 1450

Preț estimativ în valută:
18496 19225$ 15321£

Carte tipărită la comandă

Livrare economică 04-18 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9789811527159
ISBN-10: 9811527156
Pagini: 136
Ilustrații: XX, 136 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.4 kg
Ediția:1st ed. 2020
Editura: Springer Nature Singapore
Colecția Springer
Seria Cognitive Intelligence and Robotics

Locul publicării:Singapore, Singapore

Cuprins

Chapter 1. Introduction.- Chapter 2. Discretization.- Chapter 3.    Data Reduction.- Chapter 4. Q-Learning Classifiers.- Chapter 5. Hierarchical Q - Learning Classifier.- Chapter 6. Conclusions and Future Research.

Notă biografică

Nandita Sengupta holds a Bachelor of Engineering degree from the Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India (formerly known as Bengal Engineering College, Shibpur, Calcutta University). She completed a postgraduate management course in Information Technology at IMT, an M.Tech. (Information Technology) and Ph.D. in Engineering (Computer Science and Technology) at IIEST, Shibpur, India. She has worked in the field for 29 years, including 11 years in industry and 18 years teaching IT various subjects. She is currently an Associate Professor at the University College of Bahrain, Bahrain. Her areas of interest are analysis of algorithms, theory of computation, soft computing techniques, network computing and security.
Jaya Sil has been a Professor at the Department of Computer Science and Technology at the Indian Institute of Engineering Science and Technology, Shibpur, since 2003. She completed her B.E. in Electronics and Telecommunication Engineering at B.E. College, at Calcutta University, India, in 1984, and M.E. (Tele) at Jadavpur University, Kolkata, India, in 1986. She received her Ph.D. (Engg) degree in the field of artificial intelligence from Jadavpur University, Kolkata, in 1996, and started her teaching career in 1987 as a lecturer at the Department of Computer Science and Technology at B.E. College, Howrah. She worked as a Postdoctoral Fellow at Nanyang Technological University, Singapore, from 2002 to 2003. She undertook collaborative research in Husar at the Bioinformatics Lab, Heidelberg, Germany, and also visited Wroclaw University of Technology, Poland, in 2012. She was awarded an INSA Senior Scientist Fellowship. Prof. Sil has delivered tutorials and invited talks, and has also presented papers and chaired sessions at various international conferences in abroad and India. She has published more than 200 research papers (including conference papers) in the field of bioinformatics, machinelearning and image processing along with applications in a variety of engineering fields. She has published numerous books and several book chapters and acted as a reviewer for IEEE, Elsevier, and Springer Journals.


Textul de pe ultima copertă

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion.
The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.



Caracteristici

Details dimension reduction techniques, which reduce the complexity of intrusion detection systems without sacrificing prediction accuracy Sheds new light on real-time design of adaptive intrusion detection systems Includes a special chapter on reinforcement learning used for intrusion detection systems and discretization techniques