Machine Learning For Computer And Cyber Security (Record no. 6417)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01894nam a22001817a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250606165034.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250606b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781032707136 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 006.31 |
| Item number | GUP |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Gupta, Brij B. |
| 245 ## - TITLE STATEMENT | |
| Title | Machine Learning For Computer And Cyber Security |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc. | New York |
| Name of publisher, distributor, etc. | CRC Press |
| Date of publication, distribution, etc. | 2024 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Page No. | xiv, 352p. |
| Dimensions | 24 x 18 cm |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | 1. A Deep Learning-based System for Network Cyber Threat Detection<br/>2. Machine Learning for Phishing Detection and Mitigation<br/>3. Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective<br/>4. A Bio-inspired Approach to Cyber Security<br/>5. Applications of a Model to Evaluate and Utilize Users’ Interactions in Online Social Networks<br/>6. A Deep-dive on Machine Learning for Cyber Security Use Cases<br/>7. A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls<br/>8. Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection<br/>9. A Taxonomy of Bitcoin Security Issues and Defense Mechanisms<br/>10. Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture<br/>11. Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection<br/>12. Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network<br/>13. Defending Web Applications Against JavaScript Worms on Core Network of Cloud Platforms<br/>14. Importance of providing Incentives and economic Solutions in It Security<br/>15. Teaching Johnny to thwart phishing attacks: Incorporating the Role of Self-efficacy into a Game Application |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Sheng, Michael |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Reference |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Currency | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Bill Date | Koha item type | Bill Number |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | AIML (Artificial Intelligence and Machine Learning) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 04/06/2025 | ₹ | 1895.00 | 006.31 GUP | 96308 | 06/06/2025 | 03/06/2025 | Reference | CRB/84 | |||||
| Dewey Decimal Classification | AIML (Artificial Intelligence and Machine Learning) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 04/06/2025 | ₹ | 1895.00 | 006.31 GUP | 96309 | 06/06/2025 | 03/06/2025 | Reference | CRB/84 |
