Symmetry-Adapted Machine Learning for Information Security

Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical dat...

Full description

Saved in:
Bibliographic Details
Other Authors: Park, James (Editor)
Format: Book Chapter
Published: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2020
Subjects:
Online Access:Get Fullteks
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02373naaaa2200277uu 4500
001 doab_20_500_12854_68858
005 20210501
020 |a books978-3-03936-643-9 
020 |a 9783039366422 
020 |a 9783039366439 
024 7 |a 10.3390/books978-3-03936-643-9  |c doi 
041 0 |a English 
042 |a dc 
072 7 |a TBX  |2 bicssc 
100 1 |a Park, James  |4 edt 
700 1 |a Park, James  |4 oth 
245 1 0 |a Symmetry-Adapted Machine Learning for Information Security 
260 |a Basel, Switzerland  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2020 
300 |a 1 electronic resource (202 p.) 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a History of engineering & technology  |2 bicssc 
856 4 0 |a www.oapen.org  |u https://mdpi.com/books/pdfview/book/2625  |7 0  |z Get Fullteks 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/68858  |7 0  |z DOAB: description of the publication