Livros sobre o tema "Security of machine learning classifiers"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Security of machine learning classifiers".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Learning kernel classifiers: Theory and algorithms. Cambridge, Mass: MIT Press, 2002.
Encontre o texto completo da fonteChen, Xiaofeng, Willy Susilo e Elisa Bertino, eds. Cyber Security Meets Machine Learning. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6726-5.
Texto completo da fonteChen, Xiaofeng, Hongyang Yan, Qiben Yan e Xiangliang Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7.
Texto completo da fonteChen, Xiaofeng, Hongyang Yan, Qiben Yan e Xiangliang Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62460-6.
Texto completo da fonteChen, Xiaofeng, Hongyang Yan, Qiben Yan e Xiangliang Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7.
Texto completo da fonteChen, Xiaofeng, Xinyi Huang e Jun Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30619-9.
Texto completo da fonteXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai e Jin Li, eds. Machine Learning for Cyber Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20102-8.
Texto completo da fonteXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai e Jin Li, eds. Machine Learning for Cyber Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0.
Texto completo da fonteXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai e Jin Li, eds. Machine Learning for Cyber Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20099-1.
Texto completo da fonteDolev, Shlomi, Oded Margalit, Benny Pinkas e Alexander Schwarzmann, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78086-9.
Texto completo da fonteWang, Gang, Arridhana Ciptadi e Ali Ahmadzadeh, eds. Deployable Machine Learning for Security Defense. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87839-9.
Texto completo da fonteHalak, Basel, ed. Machine Learning for Embedded System Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9.
Texto completo da fonteDolev, Shlomi, Jonathan Katz e Amnon Meisels, eds. Cyber Security, Cryptology, and Machine Learning. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07689-3.
Texto completo da fonteDinur, Itai, Shlomi Dolev e Sachin Lodha, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94147-9.
Texto completo da fonteWang, Gang, Arridhana Ciptadi e Ali Ahmadzadeh, eds. Deployable Machine Learning for Security Defense. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59621-7.
Texto completo da fonteDolev, Shlomi, Vladimir Kolesnikov, Sachin Lodha e Gera Weiss, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49785-9.
Texto completo da fonteDolev, Shlomi, e Sachin Lodha, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2.
Texto completo da fonteDolev, Shlomi, Danny Hendler, Sachin Lodha e Moti Yung, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20951-3.
Texto completo da fonte-P, Tsai Jeffrey J., ed. Intrusion detection: A machine learning approach. London: Imperial College Press, 2011.
Encontre o texto completo da fonteThomas, Tony, Athira P. Vijayaraghavan e Sabu Emmanuel. Machine Learning Approaches in Cyber Security Analytics. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1706-8.
Texto completo da fonteKrishna, P. Venkata, Sasikumar Gurumoorthy e Mohammad S. Obaidat. Social Network Forensics, Cyber Security, and Machine Learning. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-1456-8.
Texto completo da fonteMaloof, Marcus A., ed. Machine Learning and Data Mining for Computer Security. London: Springer-Verlag, 2006. http://dx.doi.org/10.1007/1-84628-253-5.
Texto completo da fonteNetwork anomaly detection: A machine learning perspective. Boca Raton: CRC Press, Taylor & Francis Group, 2014.
Encontre o texto completo da fonteTanwar, Sarvesh, Sumit Badotra e Ajay Rana. Machine Learning, Blockchain, and Cyber Security in Smart Environments. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003240310.
Texto completo da fonteBhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma e Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6315-7.
Texto completo da fonteBhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma e Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6318-8.
Texto completo da fonteMena, Jesus. Machine learning forensics for law enforcement, security, and intelligence. Boca Raton, FL: Taylor & Francis, 2011.
Encontre o texto completo da fonteDoriya, Rajesh, Badal Soni, Anupam Shukla e Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5868-7.
Texto completo da fonteKhare, Nilay, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal e Vaibhav Soni, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24352-3.
Texto completo da fonteKhare, Nilay, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal e Vaibhav Soni, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24367-7.
Texto completo da fonteYu, Philip S. Machine Learning in Cyber Trust: Security, Privacy, and Reliability. Boston, MA: Springer-Verlag US, 2009.
Encontre o texto completo da fonteLecuyer, Mathias. Security, Privacy, and Transparency Guarantees for Machine Learning Systems. [New York, N.Y.?]: [publisher not identified], 2019.
Encontre o texto completo da fonteShi, Kevin. Cryptographic approaches to security and optimization in machine learning. [New York, N.Y.?]: [publisher not identified], 2020.
Encontre o texto completo da fonteMachine learning forensics for law enforcement, security, and intelligence. Boca Raton, FL: Taylor & Francis, 2011.
Encontre o texto completo da fonteHerbrich, Ralf. Learning Kernel Classifiers: Theory and Algorithms. MIT Press, 2018.
Encontre o texto completo da fonteHerbrich, Ralf. Learning Kernel Classifiers: Theory and Algorithms. MIT Press, 2022.
Encontre o texto completo da fonteHerbrich, Ralf, e Francis Bach. Learning Kernel Classifiers: Theory and Algorithms. MIT Press, 2001.
Encontre o texto completo da fonteHerbrich, Ralf. Learning Kernel Classifiers: Theory and Algorithms (Adaptive Computation and Machine Learning). The MIT Press, 2001.
Encontre o texto completo da fonte(Editor), Peter J. Bartlett, Bernhard Schölkopf (Editor), Dale Schuurmans (Editor) e Alex J. Smola (Editor), eds. Advances in Large-Margin Classifiers (Neural Information Processing). The MIT Press, 2000.
Encontre o texto completo da fonteMooney, Raymond J. Machine Learning. Editado por Ruslan Mitkov. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780199276349.013.0020.
Texto completo da fonteVidales, A. Machine Learning with Matlab. Supervised Learning: Knn Classifiers, Ensemble Learning, Random Forest, Boosting and Bagging. Independently Published, 2019.
Encontre o texto completo da fonteJoseph, Anthony D., Blaine Nelson, J. D. Tygar e Benjamin I. P. Rubinstein. Adversarial Machine Learning. Cambridge University Press, 2019.
Encontre o texto completo da fonteJoseph, Anthony D., Blaine Nelson, Benjamin I. P. Rubinstein e J. D. Tygar. Adversarial Machine Learning. Cambridge University Press, 2019.
Encontre o texto completo da fonteChen, Xiaofeng, Elisa Bertino e Willy Susilo. Cyber Security Meets Machine Learning. Springer Singapore Pte. Limited, 2021.
Encontre o texto completo da fonteChen, Xiaofeng, Elisa Bertino e Willy Susilo. Cyber Security Meets Machine Learning. Springer, 2022.
Encontre o texto completo da fonteNautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.
Encontre o texto completo da fonteNautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.
Encontre o texto completo da fonteHalak, Basel. Machine Learning for Embedded System Security. Springer International Publishing AG, 2022.
Encontre o texto completo da fonteAI, Machine Learning and Deep Learning: A Security Perspective. Taylor & Francis Group, 2023.
Encontre o texto completo da fonteAI, Machine Learning and Deep Learning: A Security Perspective. Taylor & Francis Group, 2023.
Encontre o texto completo da fonte