Books on the topic 'Security of machine learning classifiers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security of machine learning classifiers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Learning kernel classifiers: Theory and algorithms. Cambridge, Mass: MIT Press, 2002.
Find full textChen, Xiaofeng, Willy Susilo, and Elisa Bertino, eds. Cyber Security Meets Machine Learning. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6726-5.
Full textChen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7.
Full textChen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62460-6.
Full textChen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7.
Full textChen, Xiaofeng, Xinyi Huang, and Jun Zhang, eds. Machine Learning for Cyber Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30619-9.
Full textXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20102-8.
Full textXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0.
Full textXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20099-1.
Full textDolev, Shlomi, Oded Margalit, Benny Pinkas, and Alexander Schwarzmann, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78086-9.
Full textWang, Gang, Arridhana Ciptadi, and Ali Ahmadzadeh, eds. Deployable Machine Learning for Security Defense. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87839-9.
Full textHalak, Basel, ed. Machine Learning for Embedded System Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9.
Full textDolev, Shlomi, Jonathan Katz, and Amnon Meisels, eds. Cyber Security, Cryptology, and Machine Learning. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07689-3.
Full textDinur, Itai, Shlomi Dolev, and Sachin Lodha, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94147-9.
Full textWang, Gang, Arridhana Ciptadi, and Ali Ahmadzadeh, eds. Deployable Machine Learning for Security Defense. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59621-7.
Full textDolev, Shlomi, Vladimir Kolesnikov, Sachin Lodha, and Gera Weiss, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49785-9.
Full textDolev, Shlomi, and Sachin Lodha, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2.
Full textDolev, Shlomi, Danny Hendler, Sachin Lodha, and Moti Yung, eds. Cyber Security Cryptography and Machine Learning. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20951-3.
Full text-P, Tsai Jeffrey J., ed. Intrusion detection: A machine learning approach. London: Imperial College Press, 2011.
Find full textThomas, Tony, Athira P. Vijayaraghavan, and Sabu Emmanuel. Machine Learning Approaches in Cyber Security Analytics. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1706-8.
Full textKrishna, P. Venkata, Sasikumar Gurumoorthy, and Mohammad S. Obaidat. Social Network Forensics, Cyber Security, and Machine Learning. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-1456-8.
Full textMaloof, Marcus A., ed. Machine Learning and Data Mining for Computer Security. London: Springer-Verlag, 2006. http://dx.doi.org/10.1007/1-84628-253-5.
Full textNetwork anomaly detection: A machine learning perspective. Boca Raton: CRC Press, Taylor & Francis Group, 2014.
Find full textTanwar, Sarvesh, Sumit Badotra, and Ajay Rana. Machine Learning, Blockchain, and Cyber Security in Smart Environments. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003240310.
Full textBhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6315-7.
Full textBhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6318-8.
Full textMena, Jesus. Machine learning forensics for law enforcement, security, and intelligence. Boca Raton, FL: Taylor & Francis, 2011.
Find full textDoriya, Rajesh, Badal Soni, Anupam Shukla, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5868-7.
Full textKhare, Nilay, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, and Vaibhav Soni, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24352-3.
Full textKhare, Nilay, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, and Vaibhav Soni, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24367-7.
Full textYu, Philip S. Machine Learning in Cyber Trust: Security, Privacy, and Reliability. Boston, MA: Springer-Verlag US, 2009.
Find full textLecuyer, Mathias. Security, Privacy, and Transparency Guarantees for Machine Learning Systems. [New York, N.Y.?]: [publisher not identified], 2019.
Find full textShi, Kevin. Cryptographic approaches to security and optimization in machine learning. [New York, N.Y.?]: [publisher not identified], 2020.
Find full textMachine learning forensics for law enforcement, security, and intelligence. Boca Raton, FL: Taylor & Francis, 2011.
Find full textHerbrich, Ralf. Learning Kernel Classifiers: Theory and Algorithms. MIT Press, 2018.
Find full textHerbrich, Ralf. Learning Kernel Classifiers: Theory and Algorithms. MIT Press, 2022.
Find full textHerbrich, Ralf, and Francis Bach. Learning Kernel Classifiers: Theory and Algorithms. MIT Press, 2001.
Find full textHerbrich, Ralf. Learning Kernel Classifiers: Theory and Algorithms (Adaptive Computation and Machine Learning). The MIT Press, 2001.
Find full text(Editor), Peter J. Bartlett, Bernhard Schölkopf (Editor), Dale Schuurmans (Editor), and Alex J. Smola (Editor), eds. Advances in Large-Margin Classifiers (Neural Information Processing). The MIT Press, 2000.
Find full textMooney, Raymond J. Machine Learning. Edited by Ruslan Mitkov. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780199276349.013.0020.
Full textVidales, A. Machine Learning with Matlab. Supervised Learning: Knn Classifiers, Ensemble Learning, Random Forest, Boosting and Bagging. Independently Published, 2019.
Find full textJoseph, Anthony D., Blaine Nelson, J. D. Tygar, and Benjamin I. P. Rubinstein. Adversarial Machine Learning. Cambridge University Press, 2019.
Find full textJoseph, Anthony D., Blaine Nelson, Benjamin I. P. Rubinstein, and J. D. Tygar. Adversarial Machine Learning. Cambridge University Press, 2019.
Find full textChen, Xiaofeng, Elisa Bertino, and Willy Susilo. Cyber Security Meets Machine Learning. Springer Singapore Pte. Limited, 2021.
Find full textChen, Xiaofeng, Elisa Bertino, and Willy Susilo. Cyber Security Meets Machine Learning. Springer, 2022.
Find full textNautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.
Find full textNautiyal, Lata. Machine Learning for Cyber Security. de Gruyter GmbH, Walter, 2022.
Find full textHalak, Basel. Machine Learning for Embedded System Security. Springer International Publishing AG, 2022.
Find full textAI, Machine Learning and Deep Learning: A Security Perspective. Taylor & Francis Group, 2023.
Find full textAI, Machine Learning and Deep Learning: A Security Perspective. Taylor & Francis Group, 2023.
Find full text