Deep Learning Applications for Cyber Security

Mamoun Alazab (Editor), Mingjian Tang (Editor)

Research output: Book/ReportEdited BookResearch

Abstract

Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points.

Original languageEnglish
Place of PublicationSwitzerland
PublisherSpringer, Cham
Number of pages246
ISBN (Electronic)978-3-030-13057-2
ISBN (Print)978-3-030-13056-5
DOIs
Publication statusPublished - 2019

Publication series

NameAdvanced Sciences and Technologies for Security Applications
PublisherSpringer
ISSN (Print)1613-5113

Fingerprint

Intrusion detection
Security systems
Deep learning
Monitoring

Cite this

Alazab, M., & Tang, M. (Eds.) (2019). Deep Learning Applications for Cyber Security. (Advanced Sciences and Technologies for Security Applications). Switzerland: Springer, Cham. https://doi.org/10.1007/978-3-030-13057-2
Alazab, Mamoun (Editor) ; Tang, Mingjian (Editor). / Deep Learning Applications for Cyber Security. Switzerland : Springer, Cham, 2019. 246 p. (Advanced Sciences and Technologies for Security Applications).
@book{4fd43e18a0364c4a8971d9b5cbbd9b74,
title = "Deep Learning Applications for Cyber Security",
abstract = "Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points.",
editor = "Mamoun Alazab and Mingjian Tang",
year = "2019",
doi = "10.1007/978-3-030-13057-2",
language = "English",
isbn = "978-3-030-13056-5",
series = "Advanced Sciences and Technologies for Security Applications",
publisher = "Springer, Cham",

}

Alazab, M & Tang, M (eds) 2019, Deep Learning Applications for Cyber Security. Advanced Sciences and Technologies for Security Applications, Springer, Cham, Switzerland. https://doi.org/10.1007/978-3-030-13057-2

Deep Learning Applications for Cyber Security. / Alazab, Mamoun (Editor); Tang, Mingjian (Editor).

Switzerland : Springer, Cham, 2019. 246 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Book/ReportEdited BookResearch

TY - BOOK

T1 - Deep Learning Applications for Cyber Security

A2 - Alazab, Mamoun

A2 - Tang, Mingjian

PY - 2019

Y1 - 2019

N2 - Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points.

AB - Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points.

U2 - 10.1007/978-3-030-13057-2

DO - 10.1007/978-3-030-13057-2

M3 - Edited Book

SN - 978-3-030-13056-5

T3 - Advanced Sciences and Technologies for Security Applications

BT - Deep Learning Applications for Cyber Security

PB - Springer, Cham

CY - Switzerland

ER -

Alazab M, (ed.), Tang M, (ed.). Deep Learning Applications for Cyber Security. Switzerland: Springer, Cham, 2019. 246 p. (Advanced Sciences and Technologies for Security Applications). https://doi.org/10.1007/978-3-030-13057-2