Narrow your search

Library

Odisee (4)

KBC (3)

KU Leuven (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

UGent (3)

ULiège (3)

VIVES (3)

AP (1)

More...

Resource type

book (6)

digital (1)


Language

English (7)


Year
From To Submit

2024 (1)

2023 (2)

2019 (2)

2017 (2)

Listing 1 - 7 of 7
Sort by

Book
Machine learning : theory and practice
Author:
ISBN: 1003002617 1003002617 100081825X Year: 2023 Publisher: Boca Raton, Florida ; Abingdon, Oxon : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an introduction to the most popular methods in machine learning. It covers regression including regularization, tree-based methods including Random Forests and Boosted Trees, Artificial Neural Networks including CNNs, reinforcement learning, and unsupervised learning focused on clustering.


Book
Network Traffic Anomaly Detection and Prevention : Concepts, Techniques, and Tools
Authors: --- ---
ISBN: 3319651862 3319651889 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information. Topics and features: Introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks Describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets Provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners Examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing Presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools Discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality Reviews open issues and challenges in network traffic anomaly detection and prevention This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference. Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA.

Keywords

Computer science. --- Computer software --- Computer communication systems. --- Computer security. --- Electrical engineering. --- Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Performance and Reliability. --- Communications Engineering, Networks. --- Electric engineering --- Reusability of software --- Reusable code (Computer programs) --- Software reusability --- Informatics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Reusability. --- Protection --- Security measures --- Engineering --- Data protection --- Security systems --- Hacking --- Software reengineering --- Generic programming (Computer science) --- Science --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Operating systems (Computers). --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Computer operating systems --- Disk operating systems --- Systems software --- Operating systems --- Intrusion detection systems (Computer security) --- IDSs (Intrusion detection systems) --- Computer networks --- Computer software—Reusability.


Book
Recent Developments in Machine Learning and Data Analytics : IC3 2018
Authors: --- --- ---
ISBN: 981131280X 9811312796 Year: 2019 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents high-quality papers from an international forum for research on computational approaches to learning. It includes current research and findings from various research labs, universities and institutions that may lead to development of marketable products. It also provides solid support for these findings in the form of empirical studies, theoretical analysis, or comparison to psychological phenomena. Further, it features work that shows how to apply learning methods to solve important application problems as well as how machine learning research is conducted. The book is divided into two main parts: Machine Learning Techniques, which covers machine learning-related research and findings; and, Data Analytics, which introduces recent developments in this domain. Additionally, the book includes work on data analytics using machine learning techniques. .


Digital
Network Traffic Anomaly Detection and Prevention : Concepts, Techniques, and Tools
Authors: --- ---
ISBN: 9783319651880 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information. Topics and features: Introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks Describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets Provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners Examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing Presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools Discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality Reviews open issues and challenges in network traffic anomaly detection and prevention This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference. Dr. Monowar H. Bhuyan is an Associate Professor and Head of the Department of Computer Science and Engineering at Kaziranga University, Jorhat, India. Dr. Dhruba K. Bhattacharyya is a Professor in the Department of Computer Science and Engineering at Tezpur University, India. Dr. Jugal K. Kalita is a Professor in the Department of Computer Science at the University of Colorado, Colorado Springs, CO, USA.


Book
Fundamentals of Data Science : Theory and Practice.
Authors: --- ---
ISBN: 0323972632 032391778X 9780323972635 Year: 2023 Publisher: San Diego : Elsevier Science & Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book, 'Fundamentals of Data Science,' authored by Jugal K. Kalita, Dhruba K. Bhattacharyya, and Swarup Roy, offers a comprehensive exploration of the field of data science. It covers a wide array of topics including data exploration, data preparation, machine learning, regression, classification, artificial neural networks, feature selection, cluster analysis, ensemble learning, association mining, and big data analysis. The book is designed to provide a theoretical and practical understanding of data science techniques and methodologies. It aims to equip practitioners and researchers with the tools necessary for data-driven decision-making and innovation. The intended audience includes data scientists, analysts, and students seeking a deep understanding of data science principles and applications.


Book
Fundamentals of Data Science
Author:
ISBN: 9780323917780 Year: 2024 Publisher: Academic Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Recent Developments in Machine Learning and Data Analytics
Authors: --- --- --- ---
ISBN: 9789811312809 Year: 2019 Publisher: Singapore Springer Singapore :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Listing 1 - 7 of 7
Sort by