|
|
|
|
LEADER |
03851nam a2200469 a 4500 |
001 |
33689 |
003 |
BD-DhAAL |
005 |
20250227152959.0 |
008 |
180813t2011 flua b 001 0 eng d |
010 |
|
|
|a 2011006228
|
020 |
|
|
|a 9781439839423 (hardback : alk. paper)
|
020 |
|
|
|a 1439839425 (hardback : alk. paper)
|
040 |
|
|
|a DLC
|c DLC
|d DLC
|d BD-DhAAL
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a QA76.9.D343
|b D825 2011
|
082 |
0 |
0 |
|a 005.8
|2 22
|
100 |
1 |
|
|a Dua, Sumeet.
|9 27844
|
245 |
1 |
0 |
|a Data mining and machine learning in cybersecurity /
|c Sumeet Dua, Xian Du.
|
260 |
|
|
|a Boca Raton :
|b CRC Press,
|c c2011.
|
300 |
|
|
|a xxii, 234 pages :
|b illustrations ;
|c 25 cm.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "Introducing basic concepts of machine learning and data mining methodologies for cyber security, this book provides a unified reference for specific machine learning solutions and cybersecurity problems. The authors focus on how to apply machine learning methodologies in cybersecurity, categorizing methods for detecting, scanning, profiling, intrusions, and anomalies. The text presents challenges and solutions in machine learning along with cybersecurity fundamentals. It also describes advanced problems in cybersecurity in the machine learning domain and examines privacy-preserving data mining methods as a proactive security solution"--
|
520 |
|
|
|a "This interdisciplinary assessment is especially useful for students, who typically learn cybersecurity, machine learning, and data mining in independent courses. Machine learning and data mining play significant roles in cybersecurity, especially as more challenges appear with the rapid development of information discovery techniques, such as those originating from the sheer dimensionality and heterogeneous nature of the network data, the dynamic change of threats, and the severe imbalanced classes of normal and anomalous behaviors"--
|
526 |
|
|
|a CSE
|x Md. Faisal Ahmed
Lecturer
Department of CSE
Course name and no. Not Identify (CSE 496)
|
541 |
|
|
|a Trim Education
|e 33689, 43850, 43851, 43852
|
650 |
|
0 |
|a Computer security.
|9 27847
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data mining.
|9 27845
|
650 |
|
0 |
|a Machine learning.
|9 27846
|
650 |
|
0 |
|a Hacking.
|9 25163
|
650 |
|
7 |
|a COMPUTERS / Database Management / Data Mining
|9 27848
|
650 |
|
7 |
|a COMPUTERS / Software Development & Engineering / Systems Analysis & Design
|9 27849
|
650 |
|
7 |
|a COMPUTERS / Security / General
|9 27850
|
650 |
|
7 |
|a Computer science.
|9 42462
|
700 |
1 |
|
|a Du, Xian.
|9 27851
|
852 |
|
|
|a Ayesha Abed Library
|c General Stacks
|
942 |
|
|
|2 ddc
|c BK
|
999 |
|
|
|c 39459
|d 39459
|
952 |
|
|
|0 0
|1 0
|2 ddc
|4 0
|6 005_800000000000000_DUA
|7 0
|9 64240
|a BRACUL
|b BRACUL
|c GEN
|d 2018-08-08
|e Trim Education
|g 5615.00
|l 6
|m 40
|o 005.8 DUA
|p 3010033689
|r 2024-11-20
|s 2024-06-02
|t 1
|v 5615.00
|w 2018-08-08
|y BK
|x Requisitioned by Sowmitra Das for the course named-'Not Identify Course no.(CSE 496)'
|
952 |
|
|
|0 0
|1 0
|2 ddc
|4 0
|6 005_800000000000000_DUA
|7 0
|9 77021
|a BRACUL
|b BRACUL
|c GEN
|d 2024-12-11
|e Trim Education
|g 9245.00
|l 0
|o 005.8 DUA
|p 3010043850
|r 2024-12-11
|t 2
|v 9245.00
|w 2024-12-11
|y BK
|x Requisitioned by Md. Faisal Ahmed for the course named-'Not Identify Course no.(CSE 496)'
|
952 |
|
|
|0 0
|1 0
|2 ddc
|4 0
|6 005_800000000000000_DUA
|7 0
|9 77022
|a BRACUL
|b BRACUL
|c GEN
|d 2024-12-11
|e Trim Education
|g 9245.00
|l 0
|o 005.8 DUA
|p 3010043852
|r 2024-12-11
|t 4
|v 9245.00
|w 2024-12-11
|y BK
|x Requisitioned by Md. Faisal Ahmed for the course named-'Not Identify Course no.(CSE 496)'
|
952 |
|
|
|0 0
|1 0
|2 ddc
|4 0
|6 005_800000000000000_DUA
|7 0
|9 77023
|a BRACUL
|b BRACUL
|c GEN
|d 2024-12-11
|e Trim Education
|g 9245.00
|l 1
|m 2
|o 005.8 DUA
|p 3010043851
|q 2025-03-03
|r 2025-02-11
|s 2025-02-11
|t 3
|v 9245.00
|w 2024-12-11
|y BK
|x Requisitioned by Md. Faisal Ahmed for the course named-'Not Identify Course no.(CSE 496)'
|