To see the other types of publications on this topic, follow the link: Machine Learning in Security.

Books on the topic 'Machine Learning in Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Machine Learning in Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Chen, Xiaofeng, Willy Susilo, and Elisa Bertino, eds. Cyber Security Meets Machine Learning. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6726-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62460-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Xiaofeng, Xinyi Huang, and Jun Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30619-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20102-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20099-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Dan Dongseong, and Chao Chen, eds. Machine Learning for Cyber Security. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-2458-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xiang, Yang, and Jian Shen, eds. Machine Learning for Cyber Security. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-4566-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Dolev, Shlomi, Oded Margalit, Benny Pinkas, and Alexander Schwarzmann, eds. Cyber Security Cryptography and Machine Learning. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78086-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Gang, Arridhana Ciptadi, and Ali Ahmadzadeh, eds. Deployable Machine Learning for Security Defense. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87839-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Halak, Basel, ed. Machine Learning for Embedded System Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dolev, Shlomi, Jonathan Katz, and Amnon Meisels, eds. Cyber Security, Cryptology, and Machine Learning. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07689-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Dinur, Itai, Shlomi Dolev, and Sachin Lodha, eds. Cyber Security Cryptography and Machine Learning. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94147-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Gang, Arridhana Ciptadi, and Ali Ahmadzadeh, eds. Deployable Machine Learning for Security Defense. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59621-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Dolev, Shlomi, Vladimir Kolesnikov, Sachin Lodha, and Gera Weiss, eds. Cyber Security Cryptography and Machine Learning. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49785-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Dolev, Shlomi, and Sachin Lodha, eds. Cyber Security Cryptography and Machine Learning. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Dolev, Shlomi, Danny Hendler, Sachin Lodha, and Moti Yung, eds. Cyber Security Cryptography and Machine Learning. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20951-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pranav, Prashant, Archana Patel, and Sarika Jain. Machine Learning in Healthcare and Security. CRC Press, 2023. http://dx.doi.org/10.1201/9781003388845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gupta, Pramod, Naresh Kumar Sehgal, and John M. Acken. Introduction to Machine Learning with Security. Springer International Publishing, 2025. http://dx.doi.org/10.1007/978-3-031-59170-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Dolev, Shlomi, Ehud Gudes, and Pascal Paillier, eds. Cyber Security, Cryptology, and Machine Learning. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34671-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Dolev, Shlomi, Michael Elhadad, Mirosław Kutyłowski, and Giuseppe Persiano, eds. Cyber Security, Cryptology, and Machine Learning. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76934-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

-P, Tsai Jeffrey J., ed. Intrusion detection: A machine learning approach. Imperial College Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Thomas, Tony, Athira P. Vijayaraghavan, and Sabu Emmanuel. Machine Learning Approaches in Cyber Security Analytics. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1706-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Chaturvedi, Atul, Sartaj Ul Hasan, Bimal Kumar Roy, and Boaz Tsaban, eds. Cryptology and Network Security with Machine Learning. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0641-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Roy, Bimal Kumar, Atul Chaturvedi, Boaz Tsaban, and Sartaj Ul Hasan, eds. Cryptology and Network Security with Machine Learning. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-2229-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Azrour, Mourade, Jamal Mabrouki, Azidine Guezzaz, and Said Benkirane. Blockchain and Machine Learning for IoT Security. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003438779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Krishna, P. Venkata, Sasikumar Gurumoorthy, and Mohammad S. Obaidat. Social Network Forensics, Cyber Security, and Machine Learning. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-1456-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Maloof, Marcus A., ed. Machine Learning and Data Mining for Computer Security. Springer-Verlag, 2006. http://dx.doi.org/10.1007/1-84628-253-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Tanwar, Sarvesh, Sumit Badotra, and Ajay Rana. Machine Learning, Blockchain, and Cyber Security in Smart Environments. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003240310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Bhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6315-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Bhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6318-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mena, Jesus. Machine learning forensics for law enforcement, security, and intelligence. Taylor & Francis, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Doriya, Rajesh, Badal Soni, Anupam Shukla, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5868-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Khare, Nilay, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, and Vaibhav Soni, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24352-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Khare, Nilay, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, and Vaibhav Soni, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24367-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Yu, Philip S. Machine Learning in Cyber Trust: Security, Privacy, and Reliability. Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Joseph, Anthony D., Blaine Nelson, Benjamin I. P. Rubinstein, and J. D. Tygar. Adversarial Machine Learning. Cambridge University Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Joseph, Anthony D., Blaine Nelson, J. D. Tygar, and Benjamin I. P. Rubinstein. Adversarial Machine Learning. Cambridge University Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Nautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Chen, Xiaofeng, Elisa Bertino, and Willy Susilo. Cyber Security Meets Machine Learning. Springer Singapore Pte. Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Xiaofeng, Elisa Bertino, and Willy Susilo. Cyber Security Meets Machine Learning. Springer, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Nautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Nautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Halak, Basel. Machine Learning for Embedded System Security. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Machine Learning for Embedded System Security. Springer International Publishing AG, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Intrusion Detection: A Machine Learning Approach. World Scientific Publishing Co Pte Ltd, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

AI, Machine Learning and Deep Learning: A Security Perspective. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

AI, Machine Learning and Deep Learning: A Security Perspective. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!