0

Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics

eBook - Theories and Applications

Erschienen am 01.04.2021, Auflage: 1/2021
148,95 €
(inkl. MwSt.)

Download

E-Book Download
Bibliografische Daten
ISBN/EAN: 9783030662882
Sprache: Englisch
Umfang: 0 S., 5.76 MB
E-Book
Format: PDF
DRM: Digitales Wasserzeichen

Beschreibung

This book addresses theories and empirical procedures for the application of machine learning and data mining to solve problems in cyber dynamics. It explains the fundamentals of cyber dynamics, and presents how these resilient algorithms, strategies, techniques can be used for the development of the cyberspace environment such as:

cloud computing services;cyber security;data analytics; and,disruptive technologies like blockchain.

The book presents new machine learning and data mining approaches in solving problems in cyber dynamics. Basic concepts, related work reviews, illustrations, empirical results and tables are integrated in each chapter to enable the reader to fully understand the concepts, methodology, and the results presented. The book contains empirical solutions of problems in cyber dynamics ready for industrial applications.

The book will be an excellent starting point for postgraduate students and researchers because each chapter is design to have future research directions.

Autorenportrait

Haruna Chiroma received B.Tech., M.Sc., and Ph.D. degrees in computer science from Abubakar Tafawa Balewa University, Bayero University Kano and University of Malaya, respectively. He is an associate editor forTelecommunication, Computing, Electronic and Control Journal and an editorial board member forRecent advances in Computer Science and Communications.  He has published over 100 academic articles, and edited the bookAdvances on Computational Intelligence in Energy- The Applications of Nature-Inspired& Metaheuristic Algorithms in Energy.  He has been a technical programme committee member for more than 20 international conferences. Presently, Dr Chiroma is supervising 7 M.Sc. students and 2 Ph.D., 3 M.Sc. completed thesis at Abubakar Tafawa Balewa University, Bauchi, Nigeria as visiting senior lecturer and a senior lecturer at the Federal College of Education (Technical), Gombe, Nigeria.

Shafii Muhammad Abdulhamid received his Ph.D. in Computer Science from University of Technology, Malaysia, his M.Sc. in Computer Science from Bayero University Kano, Nigeria and a B.Tech in Mathematics/Computer Science from the Federal University of Technology, Nigeria. He has published numerous academic papers in reputable International journals, conference proceedings and book chapters. He is an editorial board member forBig Data and Cloud Innovation (BDCI) andJournal of Computer Science and Information Technology (JCSIT). He has served as a program committee member in many National and International Conferences. He is a member of several professional societies included IEEE Computer Society and International Association of Computer Science and Information Technology (IACSIT). Presently, he is an Assistant Professor in the Department of Information Technology& Cyber Security, Community College Doha, Qatar, and is currently supervising both Masters and PhD students.

Professor Philippe Fournier-Viger is a Canadian researcher. Five years after completing his Ph.D., he came to China and became full professor at the Harbin Institute of Technology (Shenzhen), after obtaining a title of national talent from the National Science Foundation of China. He has published more than 240 research papers in refereed international conferences and journals, which have received more than 4000 citations . He is the founder of the popular SPMF open-source data mining library, which provides more than 150 algorithms for identifying various types of patterns in data. The SPMF software has been used in more than 630 papers since 2010 for many applications from chemistry, smartphone usage analysis restaurant recommendation to malware detection. He edited the bookHigh Utility Pattern Mining: Theory, Algorithms and Applications. He is also co-organizer of the Utility Driven Mining and Learning workshop at KDD 2018 and ICDM 2019, which are the two most important conferences in data mining. He is program committee chair of various international conferences such as BDA 2019 and IEA AIE 2020, and editor-in-chief of the Data Science and Pattern Recognition journal.

Nuno M. Garcia holds a PhD in Computer Science Engineering (2008) and a 5-year BSc in Mathematics / Informatics (Hons.) (2004) from the Universidade da Beira Interior. He was a member of the Research Team at Siemens SA (2004-2007) and Nokia Siemens SA (2007-2008), and Head of Research at PLUX SA (2008-2010). Currently serving as Vice Dean of the Faculty of Engineering at UBI (2018-), he is an Assistant Professor at the Computer Science Department at UBI (2010-) and Invited Associate Professor at the Universidade Lusófona de Humanidades e Tecnologias (Lisbon, Portugal, 2010-). He was the founder and is a researcher of the Assisted Living Computing and Telecommunications Laboratory (ALLab, 2010), a research group within the Instituto de Telecomunicações at UBI. He was also co-founder and is Chair of the Executive Council of the BSAFE LAB Law enforcement, Justice and Public Safety Research and Technology Transfer Laboratory, a multidisciplinary research laboratory in UBI (2015). He is the coordinator of the Cisco Academy at UBI (2010-) and was Chair of the COST Action IC1303 AAPELE Architectures, Algorithms and Platforms for Enhanced Living Environments (Brussels, Belgium, 2013-2017).

Inhalt

Generative Adversarial Network for the Detection of Ransomware in Cyber Dynamics.- Deep Learning for Blockchain Technologies: A Survey and Research Directions.- Deep Recurrent Neural Network for the Enhancement of Resource Allocation in Edge Computing.- Recommender Systems in the Next Generation Cloud Architectures.- Collusion Detection in the Internet of Vehicles Environment via Machine Learning Algorithms.- Mobile Cloud Computing Security Strategies Using Machine Learning Algorithms.- Resilient Edge Computing Devices Using Federated Learning Technique.- DeepFake: A Panacea for New Generation Simulated Videos.- Machine Learning-Based Malware Detection Systems in a Cyber-Physical Systems.- Support Vector Machine-Based Crypto-Locker Ransomware Attacks Detection with Grey-Wolf Optimization.- A Survey of Algorithms for Analysing Graph Data in the Cloud.- A Survey of Sequence Prediction Models to Predict Behaviour of Dynamic Systems.- Finding High Utility Patterns to Detect Network Attacks.- Authorship Attribution and User Profile Inference in Social Networks.- Deep Convolutional Neural Network for Data Analytics in the Cyber Dynamics.

Informationen zu E-Books

Alle hier erworbenen E-Books können Sie in Ihrem Kundenkonto in die kostenlose PocketBook Cloud laden. Dadurch haben Sie den Vorteil, dass Sie von Ihrem PocketBook E-Reader, Ihrem Smartphone, Tablet und PC jederzeit auf Ihre gekauften und bereits vorhandenen E-Books Zugriff haben.

Um die PocketBook Cloud zu aktivieren, loggen Sie sich bitte in Ihrem Kundenkonto ein und gehen dort in den Bereich „Downloads“. Setzen Sie hier einen Haken bei „Neue E-Book-Käufe automatisch zu meiner Cloud hinzufügen.“. Dadurch wird ein PocketBook Cloud Konto für Sie angelegt. Die Zugangsdaten sind dabei dieselben wie in diesem Webshop.

Weitere Informationen zur PocketBook Cloud finden Sie unter www.meinpocketbook.de.

Allgemeine E-Book-Informationen

E-Books in diesem Webshop können in den Dateiformaten EPUB oder PDF vorliegen und können ggf. mit einem Kopierschutz versehen sein. Sie finden die entsprechenden Informationen in der Detailansicht des jeweiligen Titels.

E-Books ohne Kopierschutz oder mit einem digitalen Wasserzeichen können Sie problemlos auf Ihr Gerät übertragen. Sie müssen lediglich die Kompatibilität mit Ihrem Gerät prüfen.

Um E-Books, die mit Adobe DRM geschützt sind, auf Ihr Lesegerät zu übertragen, benötigen Sie zusätzlich eine Adobe ID und die kostenlose Software Adobe® Digital Editions, wo Sie Ihre Adobe ID hinterlegen müssen. Beim Herunterladen eines mit Adobe DRM geschützten E-Books erhalten Sie zunächst eine .acsm-Datei, die Sie in Adobe® Digital Editions öffnen müssen. Durch diesen Prozess wird das E-Book mit Ihrer Adobe-ID verknüpft und in Adobe® Digital Editions geöffnet.