This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion.
The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Nandita Sengupta holds a Bachelor of Engineering degree from the Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India (formerly known as Bengal Engineering College, Shibpur, Calcutta University). She completed a postgraduate management course in Information Technology at IMT, an M.Tech. (Information Technology) and Ph.D. in Engineering (Computer Science and Technology) at IIEST, Shibpur, India. She has worked in the field for 29 years, including 11 years in industry and 18 years teaching IT various subjects. She is currently an Associate Professor at the University College of Bahrain, Bahrain. Her areas of interest are analysis of algorithms, theory of computation, soft computing techniques, network computing and security.
Jaya Sil has been a Professor at the Department of Computer Science and Technology at the Indian Institute of Engineering Science and Technology, Shibpur, since 2003. She completed her B.E. in Electronics and Telecommunication Engineering at B.E. College, at Calcutta University, India, in 1984, and M.E. (Tele) at Jadavpur University, Kolkata, India, in 1986. She received her Ph.D. (Engg) degree in the field of artificial intelligence from Jadavpur University, Kolkata, in 1996, and started her teaching career in 1987 as a lecturer at the Department of Computer Science and Technology at B.E. College, Howrah. She worked as a Postdoctoral Fellow at Nanyang Technological University, Singapore, from 2002 to 2003. She undertook collaborative research in Husar at the Bioinformatics Lab, Heidelberg, Germany, and also visited Wroclaw University of Technology, Poland, in 2012. She was awarded an INSA Senior Scientist Fellowship. Prof. Sil has delivered tutorials and invited talks, and has also presented papers and chaired sessions at various international conferences in abroad and India. She has published more than 200 research papers (including conference papers) in the field of bioinformatics, machinelearning and image processing along with applications in a variety of engineering fields. She has published numerous books and several book chapters and acted as a reviewer for IEEE, Elsevier, and Springer Journals.
This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion.
The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 3,00 für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerGratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Deutschland
XX, 136 p. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Cognitive Intelligence and Robotics. Sprache: Englisch. Bestandsnummer des Verkäufers 8902GB
Anzahl: 4 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Details dimension reduction techniques, which reduce the complexity of intrusion detection systems without sacrificing prediction accuracy Sheds new light on real-time design of adaptive intrusion detection systemsIncludes a spec. Bestandsnummer des Verkäufers 339943858
Anzahl: Mehr als 20 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion.The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 156 pp. Englisch. Bestandsnummer des Verkäufers 9789811527159
Anzahl: 1 verfügbar
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Buch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security. 156 pp. Englisch. Bestandsnummer des Verkäufers 9789811527159
Anzahl: 2 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9789811527159_new
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security. Bestandsnummer des Verkäufers 9789811527159
Anzahl: 1 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: New. Bestandsnummer des Verkäufers 40567005-n
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: New. Bestandsnummer des Verkäufers 40567005-n
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 40567005
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 40567005
Anzahl: Mehr als 20 verfügbar