Machine Learning for Cyber Security (Record no. 88765)

000 -LEADER
fixed length control field 07234nam a22006375i 4500
001 - CONTROL NUMBER
control field 978-3-031-20096-0
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730173140.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230112s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031200960
-- 978-3-031-20096-0
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-031-20096-0
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Machine Learning for Cyber Security
Medium [electronic resource] :
Remainder of title 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I /
Statement of responsibility, etc. edited by Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham :
Name of producer, publisher, distributor, manufacturer Springer Nature Switzerland :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2023.
300 ## - PHYSICAL DESCRIPTION
Extent XXIX, 669 p. 242 illus., 154 illus. in color.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume/sequential designation 13655
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Traditional Chinese Medicine Health Status Identification with Graph Attention Network -- "Flexible Task Splitting Strategy in Aircraft Maintenance Technician Scheduling Based on Swarm Intelligence" -- Privacy Preserving CSI Fingerprint Device-Free Localization -- A Novel Blockchain-MEC-based Near-domain Medical Resource Sharing Model -- Pairwise Decomposition of Directed Graphic Models for Performing Amortized Approximate Inference -- VDDL: A Deep Learning-based Vulnerability Detection Model for Smart Contracts -- "Robust Remote Sensing Scene Classification with Multi-View Voting and Entropy Ranking" -- Visualized analysis of the emerging trends of automated audio description technology -- Anomaly Detection for Multi-Time Series with Normalizing Flow -- Encrypted Transmission Method of Network Speech Recognition Information Based on Big Data Analysis -- "A Lightweight NFT Auction Protocol for Cross-chain Environment" -- "A Multi-Scale Framework for Out-of-Distribution Detection in Dermoscopic Images" -- Swarm Intelligence for Multi-objective Portfolio Optimization -- Research on Secure Cloud Storage of Regional Economic Data Network Based on Blockchain Technology -- "Data Leakage with Label Reconstruction in Distributed Learning Environments" -- Analysis Method of Abnormal Traffic of Teaching Network in Higher Vocational Massive Open Online Course Based on Deep Convolutional Neural Network -- "Spatio-Temporal Context Modeling for Road Obstacle Detection" -- A Survey of Android Malware Detection Based on Deep Learning -- "Information Encryption Transmission Method of Automobile Communication Network Based on Neural Network" -- Explanation-Guided Minimum Adversarial Attack -- CIFD: A Distance for Complex Intuitionistic Fuzzy Set -- Security Evaluation Method of Distance Education Network Nodes Based on Machine Learning -- "MUEBA:A Multi-Model System for Insider Threat Detection" -- "Bayesian Based Security Detection Method for Vehicle CAN Bus Network" -- "Discrete Wavelet Transform-based CNN for Breast Cancer Classification from Histopathology Images" -- "Machine Learning Based Security Situation Awareness Method for Network Data Transmission Process" -- Multi-objective Hydrologic Cycle Optimization for Integrated Container Terminal Scheduling Problem -- A Method for Residual Network Image Classification with Multi-scale Feature Fusion -- "High Voltage Power Communication Network Security Early Warning and Monitoring System Based on Hmac Algorithm" -- "Large Scale Network Intrusion Detection Model Based on FS Feature Selection" -- "Research on Intelligent Detection Method of Automotive Network Data Security Based on FlexRay/CAN Gateway" -- Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective -- A Novel Security Scheme for Mobile Healthcare in Digital Twin -- Construction of Security Risk Prediction Model for Wireless Transmission of Multi Axis NC Machining Data -- Spiking Neural Networks Subject to Adversarial Attacks in Spiking Domain -- Diverse Web APIs Recommendation with Privacy-preservation for Mashup Development -- Network Security Evaluation Method of College Freshmen Career Counseling Service Based on Machine Learning -- FedTD:Efficiently share telemedicine data with federated distillation learning -- Increase channel attention based on Unet++ architecture for medical images -- Distributed Power Load Missing Value Forecasting with Privacy Protection -- Differentially Private Generative Model with Ratio-based Gradient Clipping -- Differential privacy protection algorithm for data clustering center -- Improved Kmeans algorithm based on privacy protection -- Symmetry Structured Analysis Sparse Coding for Key Frame Extraction -- Data Reconstruction from Gradient Updates in Federated Learning -- Natural Backdoor Attacks on Speech Recognition Models -- Boarding Pass Positioning with Jointly Multi-channel Segmentation and Perspective Transformation Correction -- AP-GCL:Adversarial perturbation ongraph contrastive learning -- An Overview of Opponent Modeling for Multi-agent Competition -- Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective.
520 ## - SUMMARY, ETC.
Summary, etc. The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 7245
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer engineering.
9 (RLIN) 10164
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks .
9 (RLIN) 31572
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 3969
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 31990
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Engineering and Networks.
9 (RLIN) 107120
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Engineering and Networks.
9 (RLIN) 107120
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mobile and Network Security.
9 (RLIN) 33624
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Xu, Yuan.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 107121
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yan, Hongyang.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 107122
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Teng, Huang.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 107123
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Cai, Jun.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 107124
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Li, Jin.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 107125
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 107126
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031200953
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031200977
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume/sequential designation 13655
9 (RLIN) 23263
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-20096-0">https://doi.org/10.1007/978-3-031-20096-0</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.