Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format
Cyber threats today are one of the expensive losses that an organization can face. Today, it is impossible to deploy effective cybersecurity technology without relying heavily on advanced techniques like Machine Learning and Deep Learning. Cybersecurity is a growing challenge in the era of Internet. This book addresses questions of how Machine Learning methods can be used to advance cybersecurity objectives, including detection, modeling, monitoring, and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between Machine Learning and cybersecurity communities, it discusses topics covering a wide range of modern and practical Machine Learning techniques, frameworks, and development tools to enable readers to engage with the cutting-edge research across various aspects of cybersecurity. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points. This cybersecurity book presents and demonstrates popular and successful Artificial Intelligence (AI) approaches and models that you can adapt to detect potential attacks and protect your corporate systems.
This book will assist readers in putting intelligent answers to current cybersecurity concerns into practice and in creating cutting-edge implementations that meet the demands of ever-more complex organizational structures. By the time you finish reading this book, you will be able to create and employ Machine Learning algorithms to mitigate cybersecurity risks.
Differential privacy: a solution to privacy issue in social networks
Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms
The ransomware: an emerging security challenge to the cyberspace
Property-based attestation in device swarms: a machine learning approach
A review of machine learning techniques in cybersecurity and research opportunities
A framework for seborrheic keratosis skin disease identification using Vision Transformer
Mapping AICTE cybersecurity curriculum onto CyBOK: a case study