This book is aligned with the cyber security issues and provides a wide view of the novel cyber-attacks and the defence mechanisms, especially AI-based IDS.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Dr. Mayank Swarnkar is currently working as an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology (Banaras Hindu University) Varanasi. He completed his Ph.D. from the Indian Institute of Technology Indore in 2019. He completed his M.Tech in Wireless Communication and Computing from the Indian Institute of Information Technology Allahabad in 2013 and B.E. in IT from Government Engineering College Jabalpur in 2011. He also worked as Software Engineer at NEC Technologies India for 1 year from 2013 to 2014 and as Assistant Professor at Bennett University for 1 year from 2019 to 2020. His primary areas of interest are Network and System Security. He works mainly in the field of Network Traffic Classification, Zero Day Attacks, Intrusion Detection Systems, and VoIP Spam Detection. He has given many invited talks and he is a reviewer of many reputed conferences and journals.
Dr. Shyam Singh Rajput received a B.E. degree in Computer Science & Engineering (CSE) from R. G. P.V., Bhopal, Madhya Pradesh, India, in 2011. He earned his M.Tech degree and Ph.D. degree in CSE from ABV-Indian Institute of Information Technology & Management (ABVIIITM), Gwalior, India, in 2013 and 2019, respec- tively. He has more than seven years of experience teaching undergraduate and post- graduate classes. Presently, he is working as an assistant professor in the Department of CSE, National Institute of Technology Patna, India. His current research interests include image processing, computer vision, and wireless networks. He has published more than 40 journal articles, conference papers, and book chapters in the domain of image processing, biometrics, wireless ad hoc networks, and information security. He has published three Indian patents and edited books with Elsevier and CRC Press. He is a member of IEEE and ACM.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 2,26 expédition vers Etats-Unis
Destinations, frais et délaisEUR 3,42 expédition vers Etats-Unis
Destinations, frais et délaisVendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26396577642
Quantité disponible : 4 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 46523258-n
Quantité disponible : 1 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. N° de réf. du vendeur 399832245
Quantité disponible : 3 disponible(s)
Vendeur : California Books, Miami, FL, Etats-Unis
Etat : New. N° de réf. du vendeur I-9781032386652
Quantité disponible : Plus de 20 disponibles
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
Hardback. Etat : New. New copy - Usually dispatched within 4 working days. 560. N° de réf. du vendeur B9781032386652
Quantité disponible : 1 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18396577632
Quantité disponible : 4 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Buch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS).Features:A systematic overview of the state-of-the-art IDSProper explanation of novel cyber attacks which are much different from classical cyber attacksProper and in-depth discussion of AI in the field of cybersecurityIntroduction to design and architecture of novel AI-based IDS with a trans- parent view of real-time implementationsCovers a wide variety of AI-based cyber defense mechanisms, especially in the field of network-based attacks, IoT-based attacks, multimedia attacks, and blockchain attacks.This book serves as a reference book for scientific investigators who need to analyze IDS, as well as researchers developing methodologies in this field. It may also be used as a textbook for a graduate-level course on information security. 204 pp. Englisch. N° de réf. du vendeur 9781032386652
Quantité disponible : 2 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 46523258
Quantité disponible : 1 disponible(s)
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
HRD. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L1-9781032386652
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
HRD. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L1-9781032386652
Quantité disponible : Plus de 20 disponibles