Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/835
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Kwangjo. ; | en_US |
dc.contributor.author | Aminanto, Muhamad Erza. ; | en_US |
dc.contributor.author | Tanuwidjaja, Harry Chandra. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:33Z | - |
dc.date.available | 2020-05-17T08:22:33Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9789811314445 ; | en_US |
dc.identifier.isbn | 9789811314438 (print) ; | en_US |
dc.identifier.isbn | 9789811314452 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/835 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9789811314438. ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9789811314452. ; | en_US |
dc.description | en_US | |
dc.description.abstract | This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book. Offering a comprehensive overview of deep learning-based IDS, the book is a valuable reerence resource for undergraduate and graduate students, as well as researchers and practitioners interested in deep learning and intrusion detection. Further, the comparison of various deep-learning applications helps readers gain a basic understanding of machine learning, and inspires applications in IDS and other related areas in cybersecurity. ; | en_US |
dc.description.statementofresponsibility | by Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja. | en_US |
dc.description.tableofcontents | Chapter 1 Introduction -- Chapter 2 Intrusion Detection Systems -- Chapter 3 Classical Machine Learning and Its Applications to IDS -- Chapter 4 Deep Learning -- Chapter 5 Deep Learning-based IDSs -- Chapter 6 Deep Feature Learning -- Chapter 7 Summary and Further Challenges. ; | en_US |
dc.format.extent | XVII, 79 p. 30 illus., 11 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer Singapore : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | SpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ; | en_US |
dc.relation.ispartofseries | SpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ; | en_US |
dc.relation.haspart | 9789811314438.pdf | en_US |
dc.subject | Data protection. ; | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Wireless communication systems. ; | en_US |
dc.subject | Mobile communication systems. ; | en_US |
dc.subject | Big data. ; | en_US |
dc.subject | Data Mining | en_US |
dc.subject | Security. ; http://scigraph.springernature.com/things/product-market-codes/I28000. ; | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.subject | Systems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ; | en_US |
dc.subject | Wireless and Mobile Communication. ; http://scigraph.springernature.com/things/product-market-codes/T24100. ; | en_US |
dc.subject | Big Data. ; http://scigraph.springernature.com/things/product-market-codes/I29120. ; | en_US |
dc.subject | Data Mining and Knowledge Discovery. ; http://scigraph.springernature.com/things/product-market-codes/I18030. ; | en_US |
dc.title | Network Intrusion Detection using Deep Learning | en_US |
dc.title.alternative | A Feature Learning Approach / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Singapore : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9789811314438.pdf | 2.11 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Kwangjo. ; | en_US |
dc.contributor.author | Aminanto, Muhamad Erza. ; | en_US |
dc.contributor.author | Tanuwidjaja, Harry Chandra. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:33Z | - |
dc.date.available | 2020-05-17T08:22:33Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9789811314445 ; | en_US |
dc.identifier.isbn | 9789811314438 (print) ; | en_US |
dc.identifier.isbn | 9789811314452 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/835 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9789811314438. ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9789811314452. ; | en_US |
dc.description | en_US | |
dc.description.abstract | This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book. Offering a comprehensive overview of deep learning-based IDS, the book is a valuable reerence resource for undergraduate and graduate students, as well as researchers and practitioners interested in deep learning and intrusion detection. Further, the comparison of various deep-learning applications helps readers gain a basic understanding of machine learning, and inspires applications in IDS and other related areas in cybersecurity. ; | en_US |
dc.description.statementofresponsibility | by Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja. | en_US |
dc.description.tableofcontents | Chapter 1 Introduction -- Chapter 2 Intrusion Detection Systems -- Chapter 3 Classical Machine Learning and Its Applications to IDS -- Chapter 4 Deep Learning -- Chapter 5 Deep Learning-based IDSs -- Chapter 6 Deep Feature Learning -- Chapter 7 Summary and Further Challenges. ; | en_US |
dc.format.extent | XVII, 79 p. 30 illus., 11 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer Singapore : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | SpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ; | en_US |
dc.relation.ispartofseries | SpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ; | en_US |
dc.relation.haspart | 9789811314438.pdf | en_US |
dc.subject | Data protection. ; | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Wireless communication systems. ; | en_US |
dc.subject | Mobile communication systems. ; | en_US |
dc.subject | Big data. ; | en_US |
dc.subject | Data Mining | en_US |
dc.subject | Security. ; http://scigraph.springernature.com/things/product-market-codes/I28000. ; | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.subject | Systems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ; | en_US |
dc.subject | Wireless and Mobile Communication. ; http://scigraph.springernature.com/things/product-market-codes/T24100. ; | en_US |
dc.subject | Big Data. ; http://scigraph.springernature.com/things/product-market-codes/I29120. ; | en_US |
dc.subject | Data Mining and Knowledge Discovery. ; http://scigraph.springernature.com/things/product-market-codes/I18030. ; | en_US |
dc.title | Network Intrusion Detection using Deep Learning | en_US |
dc.title.alternative | A Feature Learning Approach / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Singapore : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9789811314438.pdf | 2.11 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Kwangjo. ; | en_US |
dc.contributor.author | Aminanto, Muhamad Erza. ; | en_US |
dc.contributor.author | Tanuwidjaja, Harry Chandra. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:33Z | - |
dc.date.available | 2020-05-17T08:22:33Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9789811314445 ; | en_US |
dc.identifier.isbn | 9789811314438 (print) ; | en_US |
dc.identifier.isbn | 9789811314452 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/835 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9789811314438. ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9789811314452. ; | en_US |
dc.description | en_US | |
dc.description.abstract | This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book. Offering a comprehensive overview of deep learning-based IDS, the book is a valuable reerence resource for undergraduate and graduate students, as well as researchers and practitioners interested in deep learning and intrusion detection. Further, the comparison of various deep-learning applications helps readers gain a basic understanding of machine learning, and inspires applications in IDS and other related areas in cybersecurity. ; | en_US |
dc.description.statementofresponsibility | by Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja. | en_US |
dc.description.tableofcontents | Chapter 1 Introduction -- Chapter 2 Intrusion Detection Systems -- Chapter 3 Classical Machine Learning and Its Applications to IDS -- Chapter 4 Deep Learning -- Chapter 5 Deep Learning-based IDSs -- Chapter 6 Deep Feature Learning -- Chapter 7 Summary and Further Challenges. ; | en_US |
dc.format.extent | XVII, 79 p. 30 illus., 11 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer Singapore : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | SpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ; | en_US |
dc.relation.ispartofseries | SpringerBriefs on Cyber Security Systems and Networks, ; 2522-5561. ; | en_US |
dc.relation.haspart | 9789811314438.pdf | en_US |
dc.subject | Data protection. ; | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Wireless communication systems. ; | en_US |
dc.subject | Mobile communication systems. ; | en_US |
dc.subject | Big data. ; | en_US |
dc.subject | Data Mining | en_US |
dc.subject | Security. ; http://scigraph.springernature.com/things/product-market-codes/I28000. ; | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.subject | Systems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ; | en_US |
dc.subject | Wireless and Mobile Communication. ; http://scigraph.springernature.com/things/product-market-codes/T24100. ; | en_US |
dc.subject | Big Data. ; http://scigraph.springernature.com/things/product-market-codes/I29120. ; | en_US |
dc.subject | Data Mining and Knowledge Discovery. ; http://scigraph.springernature.com/things/product-market-codes/I18030. ; | en_US |
dc.title | Network Intrusion Detection using Deep Learning | en_US |
dc.title.alternative | A Feature Learning Approach / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Singapore : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9789811314438.pdf | 2.11 MB | Adobe PDF | Preview File |