logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Intrusion Detection A Data Mining Approach Nandita Sengupta Jaya Sil

  • SKU: BELL-10788514
Intrusion Detection A Data Mining Approach Nandita Sengupta Jaya Sil
$ 31.00 $ 45.00 (-31%)

4.7

66 reviews

Intrusion Detection A Data Mining Approach Nandita Sengupta Jaya Sil instant download after payment.

Publisher: Springer
File Extension: PDF
File size: 5.03 MB
Pages: 151
Author: Nandita Sengupta; Jaya Sil
ISBN: 9789811527159, 9789811527166, 9811527156, 9811527164
Language: English
Year: 2020

Product desciption

Intrusion Detection A Data Mining Approach Nandita Sengupta Jaya Sil by Nandita Sengupta; Jaya Sil 9789811527159, 9789811527166, 9811527156, 9811527164 instant download after payment.

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.

Related Products