Network Intrusion Detection using Deep Learning: A Feature Learning Approach

Network Intrusion Detection using Deep Learning: A Feature Learning Approach
Network Intrusion Detection using Deep Learning: A Feature Learning Approach (SpringerBriefs on Cyber Security Systems and Networks)
By 作者: Kwangjo Kim – Muhamad Erza Aminanto – Harry Chandra Tanuwidjaja
ISBN-10 书号: 9811314438
ISBN-13 书号: 9789811314438
Edition 版本: 1st ed. 2018
Release Finelybook 出版日期: 2018-09-26
pages 页数: (79 )

$69.99

Book Description to Finelybook sorting

This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book.
Offering a comprehensive overview of deep learning-based IDS, the book is a valuable reerence resource for undergraduate and graduate students, as well as researchers and practitioners interested in deep learning and intrusion detection. Further, the comparison of various deep-learning applications helps readers gain a basic understanding of machine learning, and inspires applications in IDS and other related areas in cybersecurity.
Front Matter
1.Introduction
2.Intrusion Detection Systems
3.Classical Machine Learning and Its Applications to DS
4.Deep Learning
5.Deep Learning-Based IDSs
6.Deep Feature Learning
7.Summary and Further Challenges

本文隐藏内容 登陆 后才可以浏览

以下隐藏内容!
仅供捐助用户可见,查看需要1积分,请先

ZIP压缩文内包含(PDF+EPUB+AZW3+MOBI+Code)其一
捐助送帐号积分点击了解一下
赞(0) 打赏
未经允许不得转载:finelybook » Network Intrusion Detection using Deep Learning: A Feature Learning Approach
分享到: 更多 (0)

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址

觉得文章有用就打赏一下文章作者

支付宝扫一扫打赏

微信扫一扫打赏