Beschreibung
Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points.
Autorenportrait
Mamoun Alazab is an Associate Professor in the College of Engineering, IT and Environment at Charles Darwin University, Australia. He received his PhD degree in Computer Science from the Federation University of Australia, School of Science, Information Technology and Engineering. He is a cyber security researcher and practitioner with industry and academic experience. Alazabs research is multidisciplinary that focuses on cyber security and digital forensics of computer systems with a focus on cybercrime detection and prevention. He has more than 100 research papers. He delivered many invited and keynote speeches, 22 events in 2018 alone. He convened and chaired more than 50 conferences and workshops. He works closely with government and industry on many projects. He is an editor on multiple editorial boards of international journals and a Senior Member of the IEEE.
MingJian Tang is a Senior Data Scientist at Singtel Optus, Australia. He received his PhD degree in Computer Science from La Trobe University, Melbourne, Australia, in 2009. Previously he was a Data Scientist at the Commonwealth Bank of Australia. He has participated in several industry-based research projects including unsupervised fraud detection, unstructured threat intelligence, cyber risk analysis and quantification, and big data analysis.
Inhalt
Adversarial Attack, Defense, and Applications with Deep Learning Frameworks.- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft.- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems.- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks.- Using Convolutional Neural Networks for Classifying Malicious Network Traffic.- DBD: Deep Learning DGA-based Botnet Detection.- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks.- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach.- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks.- Forensic Detection of Child Exploitation Material using Deep Learning.- Toward Detection of Child Exploitation Material: A Forensic Approach.
Informationen zu E-Books
„E-Book“ steht für digitales Buch. Um diese Art von Büchern lesen zu können wird entweder eine spezielle Software für Computer, Tablets und Smartphones oder ein E-Book Reader benötigt. Da viele verschiedene Formate (Dateien) für E-Books existieren, gilt es dabei, einiges zu beachten.
Von uns werden digitale Bücher in drei Formaten ausgeliefert. Die Formate sind EPUB mit DRM (Digital Rights Management), EPUB ohne DRM und PDF. Bei den Formaten PDF und EPUB ohne DRM müssen Sie lediglich prüfen, ob Ihr E-Book Reader kompatibel ist. Wenn ein Format mit DRM genutzt wird, besteht zusätzlich die Notwendigkeit, dass Sie einen kostenlosen Adobe® Digital Editions Account besitzen. Wenn Sie ein E-Book, das Adobe® Digital Editions benötigt herunterladen, erhalten Sie eine ASCM-Datei, die zu Digital Editions hinzugefügt und mit Ihrem Account verknüpft werden muss. Einige E-Book Reader (zum Beispiel PocketBook Touch) unterstützen auch das direkte Eingeben der Login-Daten des Adobe Accounts – somit können diese ASCM-Dateien direkt auf das betreffende Gerät kopiert werden.
Da E-Books nur für eine begrenzte Zeit – in der Regel 6 Monate – herunterladbar sind, sollten Sie stets eine Sicherheitskopie auf einem Dauerspeicher (Festplatte, USB-Stick oder CD) vorsehen. Auch ist die Menge der Downloads auf maximal 5 begrenzt.