000 05192nam a22006855i 4500
001 978-3-031-28259-1
003 DE-He213
005 20240730165328.0
007 cr nn 008mamaa
008 230408s2023 sz | s |||| 0|eng d
020 _a9783031282591
_9978-3-031-28259-1
024 7 _a10.1007/978-3-031-28259-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aBertino, Elisa.
_eauthor.
_0(orcid)
_10000-0002-4029-7051
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_988467
245 1 0 _aMachine Learning Techniques for Cybersecurity
_h[electronic resource] /
_cby Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2023.
300 _aXII, 165 p. 37 illus., 30 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSynthesis Lectures on Information Security, Privacy, and Trust,
_x1945-9750
505 0 _aIntroduction -- Background on Machine Learning Techniques -- Security Policy earning -- Software Security Analysis -- Hardware Security Analysis -- Detection -- Attack Management -- Case Studies -- Main Challenges in the Use of ML for Security -- Concluding Remarks.
520 _aThis book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.
650 0 _aData protection.
_97245
650 0 _aArtificial intelligence.
_93407
650 0 _aMachine learning.
_91831
650 0 _aComputer crimes.
_910774
650 0 _aSoftware engineering.
_94138
650 1 4 _aData and Information Security.
_931990
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aMachine Learning.
_91831
650 2 4 _aCybercrime.
_933477
650 2 4 _aSoftware Engineering.
_94138
700 1 _aBhardwaj, Sonam.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_988472
700 1 _aCicala, Fabrizio.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_988474
700 1 _aGong, Sishuai.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_988476
700 1 _aKarim, Imtiaz.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_988478
700 1 _aKatsis, Charalampos.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_988479
700 1 _aLee, Hyunwoo.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_988481
700 1 _aLi, Adrian Shuai.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_988482
700 1 _aMahgoub, Ashraf Y.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_988484
710 2 _aSpringerLink (Online service)
_988485
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031282584
776 0 8 _iPrinted edition:
_z9783031282607
776 0 8 _iPrinted edition:
_z9783031282614
830 0 _aSynthesis Lectures on Information Security, Privacy, and Trust,
_x1945-9750
_988486
856 4 0 _uhttps://doi.org/10.1007/978-3-031-28259-1
912 _aZDB-2-SXSC
942 _cEBK
999 _c86255
_d86255