This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS).
Features:
This book serves as a reference book for scientific investigators who need to analyze IDS, as well as researchers developing methodologies in this field. It may also be used as a textbook for a graduate-level course on information security.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Dr. Mayank Swarnkar is currently working as an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology (Banaras Hindu University) Varanasi. He completed his Ph.D. from the Indian Institute of Technology Indore in 2019. He completed his M.Tech in Wireless Communication and Computing from the Indian Institute of Information Technology Allahabad in 2013 and B.E. in IT from Government Engineering College Jabalpur in 2011. He also worked as Software Engineer at NEC Technologies India for 1 year from 2013 to 2014 and as Assistant Professor at Bennett University for 1 year from 2019 to 2020. His primary areas of interest are Network and System Security. He works mainly in the field of Network Traffic Classification, Zero Day Attacks, Intrusion Detection Systems, and VoIP Spam Detection. He has given many invited talks and he is a reviewer of many reputed conferences and journals.
Dr. Shyam Singh Rajput received a B.E. degree in Computer Science & Engineering (CSE) from R. G. P.V., Bhopal, Madhya Pradesh, India, in 2011. He earned his M.Tech degree and Ph.D. degree in CSE from ABV-Indian Institute of Information Technology & Management (ABVIIITM), Gwalior, India, in 2013 and 2019, respec- tively. He has more than seven years of experience teaching undergraduate and post- graduate classes. Presently, he is working as an assistant professor in the Department of CSE, National Institute of Technology Patna, India. His current research interests include image processing, computer vision, and wireless networks. He has published more than 40 journal articles, conference papers, and book chapters in the domain of image processing, biometrics, wireless ad hoc networks, and information security. He has published three Indian patents and edited books with Elsevier and CRC Press. He is a member of IEEE and ACM.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 17,58 expédition depuis Etats-Unis vers France
Destinations, frais et délaisEUR 10,54 expédition depuis Royaume-Uni vers France
Destinations, frais et délaisVendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. N° de réf. du vendeur 409128914
Quantité disponible : 3 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 50072209
Quantité disponible : 10 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 50072209
Quantité disponible : 10 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. N° de réf. du vendeur 18404058119
Quantité disponible : 3 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. Neuware - This book is aligned with the cyber security issues and provides a wide view of the novel cyber-attacks and the defence mechanisms, especially AI-based IDS. N° de réf. du vendeur 9781032386966
Quantité disponible : 2 disponible(s)
Vendeur : AussieBookSeller, Truganina, VIC, Australie
Paperback. Etat : new. Paperback. This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS).Features:A systematic overview of the state-of-the-art IDSProper explanation of novel cyber attacks which are much different from classical cyber attacksProper and in-depth discussion of AI in the field of cybersecurityIntroduction to design and architecture of novel AI-based IDS with a trans- parent view of real-time implementationsCovers a wide variety of AI-based cyber defense mechanisms, especially in the field of network-based attacks, IoT-based attacks, multimedia attacks, and blockchain attacks.This book serves as a reference book for scientific investigators who need to analyze IDS, as well as researchers developing methodologies in this field. It may also be used as a textbook for a graduate-level course on information security. This book is aligned with the cyber security issues and provides a wide view of the novel cyber-attacks and the defence mechanisms, especially AI-based IDS. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability. N° de réf. du vendeur 9781032386966
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 50072209-n
Quantité disponible : 10 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 50072209-n
Quantité disponible : 10 disponible(s)
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. 1st edition NO-PA16APR2015-KAP. N° de réf. du vendeur 26404058125
Quantité disponible : 3 disponible(s)
Vendeur : CitiRetail, Stevenage, Royaume-Uni
Paperback. Etat : new. Paperback. This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS).Features:A systematic overview of the state-of-the-art IDSProper explanation of novel cyber attacks which are much different from classical cyber attacksProper and in-depth discussion of AI in the field of cybersecurityIntroduction to design and architecture of novel AI-based IDS with a trans- parent view of real-time implementationsCovers a wide variety of AI-based cyber defense mechanisms, especially in the field of network-based attacks, IoT-based attacks, multimedia attacks, and blockchain attacks.This book serves as a reference book for scientific investigators who need to analyze IDS, as well as researchers developing methodologies in this field. It may also be used as a textbook for a graduate-level course on information security. This book is aligned with the cyber security issues and provides a wide view of the novel cyber-attacks and the defence mechanisms, especially AI-based IDS. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. N° de réf. du vendeur 9781032386966
Quantité disponible : 1 disponible(s)