Machine Learning For Computer And Cyber Security (Record no. 6417)

MARC details
000 -LEADER
fixed length control field 01894nam a22001817a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250606165034.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250606b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032707136
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.31
Item number GUP
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Gupta, Brij B.
245 ## - TITLE STATEMENT
Title Machine Learning For Computer And Cyber Security
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New York
Name of publisher, distributor, etc. CRC Press
Date of publication, distribution, etc. 2024
300 ## - PHYSICAL DESCRIPTION
Page No. xiv, 352p.
Dimensions 24 x 18 cm
520 ## - SUMMARY, ETC.
Summary, etc. 1. A Deep Learning-based System for Network Cyber Threat Detection<br/>2. Machine Learning for Phishing Detection and Mitigation<br/>3. Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective<br/>4. A Bio-inspired Approach to Cyber Security<br/>5. Applications of a Model to Evaluate and Utilize Users’ Interactions in Online Social Networks<br/>6. A Deep-dive on Machine Learning for Cyber Security Use Cases<br/>7. A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls<br/>8. Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection<br/>9. A Taxonomy of Bitcoin Security Issues and Defense Mechanisms<br/>10. Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture<br/>11. Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection<br/>12. Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network<br/>13. Defending Web Applications Against JavaScript Worms on Core Network of Cloud Platforms<br/>14. Importance of providing Incentives and economic Solutions in It Security<br/>15. Teaching Johnny to thwart phishing attacks: Incorporating the Role of Self-efficacy into a Game Application
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Sheng, Michael
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Reference
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Currency Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Bill Date Koha item type Bill Number
    Dewey Decimal Classification     AIML (Artificial Intelligence and Machine Learning) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 04/06/2025 1895.00   006.31 GUP 96308 06/06/2025 03/06/2025 Reference CRB/84
    Dewey Decimal Classification     AIML (Artificial Intelligence and Machine Learning) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 04/06/2025 1895.00   006.31 GUP 96309 06/06/2025 03/06/2025 Reference CRB/84
Implemented & Customized by: BestBookBuddies

Powered by Koha