Siga este link para ver outros tipos de publicações sobre o tema: Security of machine learning classifiers.

Livros sobre o tema "Security of machine learning classifiers"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores livros para estudos sobre o assunto "Security of machine learning classifiers".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.

1

Learning kernel classifiers: Theory and algorithms. Cambridge, Mass: MIT Press, 2002.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Chen, Xiaofeng, Willy Susilo e Elisa Bertino, eds. Cyber Security Meets Machine Learning. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6726-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Chen, Xiaofeng, Hongyang Yan, Qiben Yan e Xiangliang Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Chen, Xiaofeng, Hongyang Yan, Qiben Yan e Xiangliang Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62460-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Chen, Xiaofeng, Hongyang Yan, Qiben Yan e Xiangliang Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Chen, Xiaofeng, Xinyi Huang e Jun Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30619-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Xu, Yuan, Hongyang Yan, Huang Teng, Jun Cai e Jin Li, eds. Machine Learning for Cyber Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20102-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Xu, Yuan, Hongyang Yan, Huang Teng, Jun Cai e Jin Li, eds. Machine Learning for Cyber Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Xu, Yuan, Hongyang Yan, Huang Teng, Jun Cai e Jin Li, eds. Machine Learning for Cyber Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20099-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Dolev, Shlomi, Oded Margalit, Benny Pinkas e Alexander Schwarzmann, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78086-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Wang, Gang, Arridhana Ciptadi e Ali Ahmadzadeh, eds. Deployable Machine Learning for Security Defense. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87839-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Halak, Basel, ed. Machine Learning for Embedded System Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Dolev, Shlomi, Jonathan Katz e Amnon Meisels, eds. Cyber Security, Cryptology, and Machine Learning. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07689-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Dinur, Itai, Shlomi Dolev e Sachin Lodha, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94147-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Wang, Gang, Arridhana Ciptadi e Ali Ahmadzadeh, eds. Deployable Machine Learning for Security Defense. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59621-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Dolev, Shlomi, Vladimir Kolesnikov, Sachin Lodha e Gera Weiss, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49785-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Dolev, Shlomi, e Sachin Lodha, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Dolev, Shlomi, Danny Hendler, Sachin Lodha e Moti Yung, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20951-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

-P, Tsai Jeffrey J., ed. Intrusion detection: A machine learning approach. London: Imperial College Press, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Thomas, Tony, Athira P. Vijayaraghavan e Sabu Emmanuel. Machine Learning Approaches in Cyber Security Analytics. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1706-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Krishna, P. Venkata, Sasikumar Gurumoorthy e Mohammad S. Obaidat. Social Network Forensics, Cyber Security, and Machine Learning. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-1456-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Maloof, Marcus A., ed. Machine Learning and Data Mining for Computer Security. London: Springer-Verlag, 2006. http://dx.doi.org/10.1007/1-84628-253-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Network anomaly detection: A machine learning perspective. Boca Raton: CRC Press, Taylor & Francis Group, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Tanwar, Sarvesh, Sumit Badotra e Ajay Rana. Machine Learning, Blockchain, and Cyber Security in Smart Environments. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003240310.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Bhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma e Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6315-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Bhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma e Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6318-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Mena, Jesus. Machine learning forensics for law enforcement, security, and intelligence. Boca Raton, FL: Taylor & Francis, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Doriya, Rajesh, Badal Soni, Anupam Shukla e Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5868-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Khare, Nilay, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal e Vaibhav Soni, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24352-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Khare, Nilay, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal e Vaibhav Soni, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24367-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Yu, Philip S. Machine Learning in Cyber Trust: Security, Privacy, and Reliability. Boston, MA: Springer-Verlag US, 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Lecuyer, Mathias. Security, Privacy, and Transparency Guarantees for Machine Learning Systems. [New York, N.Y.?]: [publisher not identified], 2019.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Shi, Kevin. Cryptographic approaches to security and optimization in machine learning. [New York, N.Y.?]: [publisher not identified], 2020.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Machine learning forensics for law enforcement, security, and intelligence. Boca Raton, FL: Taylor & Francis, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Herbrich, Ralf. Learning Kernel Classifiers: Theory and Algorithms. MIT Press, 2018.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Herbrich, Ralf. Learning Kernel Classifiers: Theory and Algorithms. MIT Press, 2022.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Herbrich, Ralf, e Francis Bach. Learning Kernel Classifiers: Theory and Algorithms. MIT Press, 2001.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Herbrich, Ralf. Learning Kernel Classifiers: Theory and Algorithms (Adaptive Computation and Machine Learning). The MIT Press, 2001.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

(Editor), Peter J. Bartlett, Bernhard Schölkopf (Editor), Dale Schuurmans (Editor) e Alex J. Smola (Editor), eds. Advances in Large-Margin Classifiers (Neural Information Processing). The MIT Press, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Mooney, Raymond J. Machine Learning. Editado por Ruslan Mitkov. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780199276349.013.0020.

Texto completo da fonte
Resumo:
This article introduces the type of symbolic machine learning in which decision trees, rules, or case-based classifiers are induced from supervised training examples. It describes the representation of knowledge assumed by each of these approaches and reviews basic algorithms for inducing such representations from annotated training examples and using the acquired knowledge to classify future instances. Machine learning is the study of computational systems that improve performance on some task with experience. Most machine learning methods concern the task of categorizing examples described by a set of features. These techniques can be applied to learn knowledge required for a variety of problems in computational linguistics ranging from part-of-speech tagging and syntactic parsing to word-sense disambiguation and anaphora resolution. Finally, this article reviews the applications to a variety of these problems, such as morphology, part-of-speech tagging, word-sense disambiguation, syntactic parsing, semantic parsing, information extraction, and anaphora resolution.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Vidales, A. Machine Learning with Matlab. Supervised Learning: Knn Classifiers, Ensemble Learning, Random Forest, Boosting and Bagging. Independently Published, 2019.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Joseph, Anthony D., Blaine Nelson, J. D. Tygar e Benjamin I. P. Rubinstein. Adversarial Machine Learning. Cambridge University Press, 2019.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Joseph, Anthony D., Blaine Nelson, Benjamin I. P. Rubinstein e J. D. Tygar. Adversarial Machine Learning. Cambridge University Press, 2019.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Chen, Xiaofeng, Elisa Bertino e Willy Susilo. Cyber Security Meets Machine Learning. Springer Singapore Pte. Limited, 2021.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Chen, Xiaofeng, Elisa Bertino e Willy Susilo. Cyber Security Meets Machine Learning. Springer, 2022.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Nautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Nautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Halak, Basel. Machine Learning for Embedded System Security. Springer International Publishing AG, 2022.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

AI, Machine Learning and Deep Learning: A Security Perspective. Taylor & Francis Group, 2023.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

AI, Machine Learning and Deep Learning: A Security Perspective. Taylor & Francis Group, 2023.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia