Machine Learning in Cyber Trust Security, Privacy, and Reliability / edited by Jeffrey J. P. Tsai, Philip S. Yu.

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning proble...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Tsai, Jeffrey J. P. (Editor), Yu, Philip S. (Editor)
Format: eBook
Language:English
Published: New York, NY : Springer US : Imprint: Springer, 2009.
Edition:1st ed. 2009.
Series:Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3328757
003 MWH
005 20190817021658.0
007 cr nn 008mamaa
008 100301s2009 xxu| s |||| 0|eng d
020 |a 9780387887357 
024 7 |a 10.1007/978-0-387-88735-7  |2 doi 
035 |a (DE-He213)978-0-387-88735-7 
050 4 |a E-Book 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
245 1 0 |a Machine Learning in Cyber Trust  |h [electronic resource] :  |b Security, Privacy, and Reliability /  |c edited by Jeffrey J. P. Tsai, Philip S. Yu. 
250 |a 1st ed. 2009. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2009. 
300 |a XVI, 362 p. 100 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Springer eBook Collection 
505 0 |a Cyber System -- Cyber-Physical Systems: A New Frontier -- Security -- Misleading Learners: Co-opting Your Spam Filter -- Survey of Machine Learning Methods for Database Security -- Identifying Threats Using Graph-based Anomaly Detection -- On the Performance of Online Learning Methods for Detecting Malicious Executables -- Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems -- A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features -- Image Encryption and Chaotic Cellular Neural Network -- Privacy -- From Data Privacy to Location Privacy -- Privacy Preserving Nearest Neighbor Search -- Reliability -- High-Confidence Compositional Reliability Assessment of SOA-Based Systems Using Machine Learning Techniques -- Model, Properties, and Applications of Context-Aware Web Services. 
520 |a Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms. This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work. Specific features include the following: A survey of various approaches using machine learning/data mining techniques to enhance the traditional security mechanisms of databases A discussion of detection of SQL Injection attacks and anomaly detection for defending against insider threats An approach to detecting anomalies in a graph-based representation of the data collected during the monitoring of cyber and other infrastructures An empirical study of seven online-learning methods on the task of detecting malicious executables A novel network intrusion detection framework for mining and detecting sequential intrusion patterns A solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems An image encryption algorithm based on a chaotic cellular neural network to deal with information security and assurance An overview of data privacy research, examining the achievements, challenges and opportunities while pinpointing individual research efforts on the grand map of data privacy protection An algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data An approach for assessing the reliability of SOA-based systems using AI reasoning techniques The models, properties, and applications of context-aware Web services, including an ontology-based context model to enable formal description and acquisition of contextual information pertaining to service requestors and services Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Computer security. 
650 0 |a Data mining. 
650 0 |a Artificial intelligence. 
690 |a Electronic resources (E-books) 
700 1 |a Tsai, Jeffrey J. P.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Yu, Philip S.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-0-387-88735-7  |3 Click to view e-book  |t 0 
907 |a .b33287570  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g xxu  |h 0  |i 1 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i22419196  |z 02-26-20 
999 f f |i 3191221c-b624-51dc-8230-39208a1e3d5d  |s e584051c-9cdf-50bf-998e-ec22d1604c42  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book  |h Library of Congress classification  |i Elec File