Books on the topic 'Machine Learning in Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Machine Learning in Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Chen, Xiaofeng, Willy Susilo, and Elisa Bertino, eds. Cyber Security Meets Machine Learning. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6726-5.
Full textChen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7.
Full textChen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62460-6.
Full textChen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7.
Full textChen, Xiaofeng, Xinyi Huang, and Jun Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30619-9.
Full textXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20102-8.
Full textXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0.
Full textXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20099-1.
Full textKim, Dan Dongseong, and Chao Chen, eds. Machine Learning for Cyber Security. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-2458-1.
Full textXiang, Yang, and Jian Shen, eds. Machine Learning for Cyber Security. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-4566-4.
Full textDolev, Shlomi, Oded Margalit, Benny Pinkas, and Alexander Schwarzmann, eds. Cyber Security Cryptography and Machine Learning. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78086-9.
Full textWang, Gang, Arridhana Ciptadi, and Ali Ahmadzadeh, eds. Deployable Machine Learning for Security Defense. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87839-9.
Full textHalak, Basel, ed. Machine Learning for Embedded System Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9.
Full textDolev, Shlomi, Jonathan Katz, and Amnon Meisels, eds. Cyber Security, Cryptology, and Machine Learning. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07689-3.
Full textDinur, Itai, Shlomi Dolev, and Sachin Lodha, eds. Cyber Security Cryptography and Machine Learning. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94147-9.
Full textWang, Gang, Arridhana Ciptadi, and Ali Ahmadzadeh, eds. Deployable Machine Learning for Security Defense. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59621-7.
Full textDolev, Shlomi, Vladimir Kolesnikov, Sachin Lodha, and Gera Weiss, eds. Cyber Security Cryptography and Machine Learning. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49785-9.
Full textDolev, Shlomi, and Sachin Lodha, eds. Cyber Security Cryptography and Machine Learning. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2.
Full textDolev, Shlomi, Danny Hendler, Sachin Lodha, and Moti Yung, eds. Cyber Security Cryptography and Machine Learning. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20951-3.
Full textPranav, Prashant, Archana Patel, and Sarika Jain. Machine Learning in Healthcare and Security. CRC Press, 2023. http://dx.doi.org/10.1201/9781003388845.
Full textGupta, Pramod, Naresh Kumar Sehgal, and John M. Acken. Introduction to Machine Learning with Security. Springer International Publishing, 2025. http://dx.doi.org/10.1007/978-3-031-59170-9.
Full textDolev, Shlomi, Ehud Gudes, and Pascal Paillier, eds. Cyber Security, Cryptology, and Machine Learning. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34671-2.
Full textDolev, Shlomi, Michael Elhadad, Mirosław Kutyłowski, and Giuseppe Persiano, eds. Cyber Security, Cryptology, and Machine Learning. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76934-4.
Full text-P, Tsai Jeffrey J., ed. Intrusion detection: A machine learning approach. Imperial College Press, 2011.
Find full textThomas, Tony, Athira P. Vijayaraghavan, and Sabu Emmanuel. Machine Learning Approaches in Cyber Security Analytics. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1706-8.
Full textChaturvedi, Atul, Sartaj Ul Hasan, Bimal Kumar Roy, and Boaz Tsaban, eds. Cryptology and Network Security with Machine Learning. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0641-9.
Full textRoy, Bimal Kumar, Atul Chaturvedi, Boaz Tsaban, and Sartaj Ul Hasan, eds. Cryptology and Network Security with Machine Learning. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-2229-1.
Full textAzrour, Mourade, Jamal Mabrouki, Azidine Guezzaz, and Said Benkirane. Blockchain and Machine Learning for IoT Security. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003438779.
Full textKrishna, P. Venkata, Sasikumar Gurumoorthy, and Mohammad S. Obaidat. Social Network Forensics, Cyber Security, and Machine Learning. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-1456-8.
Full textMaloof, Marcus A., ed. Machine Learning and Data Mining for Computer Security. Springer-Verlag, 2006. http://dx.doi.org/10.1007/1-84628-253-5.
Full textTanwar, Sarvesh, Sumit Badotra, and Ajay Rana. Machine Learning, Blockchain, and Cyber Security in Smart Environments. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003240310.
Full textBhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6315-7.
Full textBhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6318-8.
Full textMena, Jesus. Machine learning forensics for law enforcement, security, and intelligence. Taylor & Francis, 2011.
Find full textDoriya, Rajesh, Badal Soni, Anupam Shukla, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5868-7.
Full textKhare, Nilay, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, and Vaibhav Soni, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24352-3.
Full textKhare, Nilay, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, and Vaibhav Soni, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24367-7.
Full textYu, Philip S. Machine Learning in Cyber Trust: Security, Privacy, and Reliability. Springer-Verlag US, 2009.
Find full textJoseph, Anthony D., Blaine Nelson, Benjamin I. P. Rubinstein, and J. D. Tygar. Adversarial Machine Learning. Cambridge University Press, 2019.
Find full textJoseph, Anthony D., Blaine Nelson, J. D. Tygar, and Benjamin I. P. Rubinstein. Adversarial Machine Learning. Cambridge University Press, 2019.
Find full textNautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.
Find full textChen, Xiaofeng, Elisa Bertino, and Willy Susilo. Cyber Security Meets Machine Learning. Springer Singapore Pte. Limited, 2021.
Find full textChen, Xiaofeng, Elisa Bertino, and Willy Susilo. Cyber Security Meets Machine Learning. Springer, 2022.
Find full textNautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.
Find full textNautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.
Find full textHalak, Basel. Machine Learning for Embedded System Security. Springer International Publishing AG, 2022.
Find full textMachine Learning for Embedded System Security. Springer International Publishing AG, 2023.
Find full textIntrusion Detection: A Machine Learning Approach. World Scientific Publishing Co Pte Ltd, 2011.
Find full textAI, Machine Learning and Deep Learning: A Security Perspective. Taylor & Francis Group, 2023.
Find full textAI, Machine Learning and Deep Learning: A Security Perspective. Taylor & Francis Group, 2023.
Find full text