Intrusion Detection: A Data Mining Approach

Intrusion Detection: A Data Mining Approach  eBooks & eLearning

Posted by roxul at June 23, 2020
Intrusion Detection: A Data Mining Approach

Nandita Sengupta, "Intrusion Detection: A Data Mining Approach "
English | ISBN: 9811527156 | 2020 | 136 pages | PDF | 5 MB

Intrusion Detection: A Data Mining Approach  eBooks & eLearning

Posted by roxul at Jan. 24, 2020
Intrusion Detection: A Data Mining Approach

Nandita Sengupta, "Intrusion Detection: A Data Mining Approach "
English | ISBN: 9811527156 | 2020 | 136 pages | PDF | 5 MB

Classification Functions for Machine Learning and Data Mining  eBooks & eLearning

Posted by hill0 at July 19, 2023
Classification Functions for Machine Learning and Data Mining

Classification Functions for Machine Learning and Data Mining
English | 2023 | ISBN: 3031353463 | 215 Pages | PDF EPUB (True) | 10 MB

Design and implementation of data mining tools  eBooks & eLearning

Posted by insetes at April 11, 2021
Design and implementation of data mining tools

Design and implementation of data mining tools By Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang
2009 | 276 Pages | ISBN: 1420045903 | PDF | 9 MB

Feature Selection for High-Dimensional Data  eBooks & eLearning

Posted by step778 at June 30, 2020
Feature Selection for High-Dimensional Data

Verónica Bolón-Canedo, Noelia Sánchez-Maroño, Amparo Alonso-Betanzos, "Feature Selection for High-Dimensional Data"
English | 2015 | pages: 163 | ISBN: 3319218573 | PDF | 1,2 mb

Big Data Analytics: A Social Network Approach  eBooks & eLearning

Posted by viserion at Jan. 11, 2019
Big Data Analytics: A Social Network Approach

Mrutyunjaya Panda, Ajith Abraham, Aboul Ella Hassanien, "Big Data Analytics: A Social Network Approach"
ISBN: 1138082163 | 2018 | PDF | 322 pages | 11 MB

Machine Learning in Cyber Trust: Security, Privacy, and Reliability  eBooks & eLearning

Posted by AvaxGenius at Aug. 17, 2019
Machine Learning in Cyber Trust: Security, Privacy, and Reliability

Machine Learning in Cyber Trust: Security, Privacy, and Reliability by Philip S. Yu
English | PDF | 2009 | 367 Pages | ISBN : 0387887342 | 9.79 MB

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools  eBooks & eLearning

Posted by AvaxGenius at Sept. 7, 2017
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools

Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools By Monowar H. Bhuyan, Prof. Dhruba K. Bhattacharyya, Prof. Jugal K. Kalita
English | PDF | 2017 | 278 Pages | ISBN : 3319651862 | 5.68 MB

This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information.

Practical Graph Mining with R  eBooks & eLearning

Posted by interes at May 30, 2020
Practical Graph Mining with R

Practical Graph Mining with R by Nagiza F. Samatova and William Hendrix
English | ISBN: 143986084X | 2013 | 495 pages | PDF | 23 MB

Outlier Analysis (repost)  eBooks & eLearning

Posted by roxul at June 14, 2017
Outlier Analysis (repost)

Charu C. Aggarwal, "Outlier Analysis"
2013 | ISBN-10: 1461463955 | 461 pages | PDF | 5,6 MB