001435554 000__ 04318cam\a2200541\a\4500 001435554 001__ 1435554 001435554 003__ OCoLC 001435554 005__ 20230309003900.0 001435554 006__ m\\\\\o\\d\\\\\\\\ 001435554 007__ cr\un\nnnunnun 001435554 008__ 210405s2021\\\\sz\\\\\\o\\\\\000\0\eng\d 001435554 019__ $$a1245666828 001435554 020__ $$a9783030662882$$q(electronic bk.) 001435554 020__ $$a3030662888$$q(electronic bk.) 001435554 020__ $$z303066287X 001435554 020__ $$z9783030662875 001435554 0247_ $$a10.1007/978-3-030-66288-2$$2doi 001435554 035__ $$aSP(OCoLC)1244805799 001435554 040__ $$aYDX$$beng$$epn$$cYDX$$dGW5XE$$dEBLCP$$dOCLCO$$dOCLCF$$dUKAHL$$dN$T$$dOCLCO$$dOCLCQ$$dOCLCO$$dCOM$$dOCLCQ 001435554 049__ $$aISEA 001435554 050_4 $$aQ325.5 001435554 08204 $$a006.3/1$$223 001435554 24500 $$aMachine learning and data mining for emerging trend in cyber dynamics :$$btheories and applications /$$cHaruna Chiroma, Shafi'i M. Abdulhamid, Philippe Fournier-Viger, Nuno M. Garcia, editors. 001435554 260__ $$aCham :$$bSpringer,$$c2021. 001435554 300__ $$a1 online resource 001435554 336__ $$atext$$btxt$$2rdacontent 001435554 337__ $$acomputer$$bc$$2rdamedia 001435554 338__ $$aonline resource$$bcr$$2rdacarrier 001435554 5050_ $$aGenerative Adversarial Network for the Detection of Ransomware in Cyber Dynamics -- Deep Learning for Blockchain Technologies: A Survey and Research Directions -- Deep Recurrent Neural Network for the Enhancement of Resource Allocation in Edge Computing -- Recommender Systems in the Next Generation Cloud Architectures -- Collusion Detection in the Internet of Vehicles Environment via Machine Learning Algorithms -- Mobile Cloud Computing Security Strategies Using Machine Learning Algorithms -- Resilient Edge Computing Devices Using Federated Learning Technique -- DeepFake: A Panacea for New Generation Simulated Videos -- Machine Learning-Based Malware Detection Systems in a Cyber-Physical Systems -- Support Vector Machine-Based Crypto-Locker Ransomware Attacks Detection with Grey-Wolf Optimization -- A Survey of Algorithms for Analysing Graph Data in the Cloud -- A Survey of Sequence Prediction Models to Predict Behaviour of Dynamic Systems -- Finding High Utility Patterns to Detect Network Attacks -- Authorship Attribution and User Profile Inference in Social Networks -- Deep Convolutional Neural Network for Data Analytics in the Cyber Dynamics. 001435554 506__ $$aAccess limited to authorized users. 001435554 520__ $$aThis book addresses theories and empirical procedures for the application of machine learning and data mining to solve problems in cyber dynamics. It explains the fundamentals of cyber dynamics, and presents how these resilient algorithms, strategies, techniques can be used for the development of the cyberspace environment such as: cloud computing services; cyber security; data analytics; and, disruptive technologies like blockchain. The book presents new machine learning and data mining approaches in solving problems in cyber dynamics. Basic concepts, related work reviews, illustrations, empirical results and tables are integrated in each chapter to enable the reader to fully understand the concepts, methodology, and the results presented. The book contains empirical solutions of problems in cyber dynamics ready for industrial applications. The book will be an excellent starting point for postgraduate students and researchers because each chapter is design to have future research directions. 001435554 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 19, 2021). 001435554 650_0 $$aMachine learning. 001435554 650_0 $$aData mining. 001435554 650_6 $$aApprentissage automatique. 001435554 650_6 $$aExploration de données (Informatique) 001435554 655_0 $$aElectronic books. 001435554 7001_ $$aChiroma, Haruna,$$eeditor$$0(orcid)0000-0003-3446-4316$$1https://orcid.org/0000-0003-3446-4316 001435554 7001_ $$aAbdulhamid, Shafi'i Muhammad,$$d1997-$$eeditor$$1https://orcid.org/0000-0001-9196-9447 001435554 7001_ $$aFournier-Viger, Philippe,$$eeditor$$1https://orcid.org/0000-0002-7680-9899 001435554 7001_ $$aGarcia, Nuno M.,$$eeditor$$1https://orcid.org/0000-0002-3195-3168 001435554 77608 $$iPrint version:$$z303066287X$$z9783030662875$$w(OCoLC)1223069124 001435554 852__ $$bebk 001435554 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-66288-2$$zOnline Access$$91397441.1 001435554 909CO $$ooai:library.usi.edu:1435554$$pGLOBAL_SET 001435554 980__ $$aBIB 001435554 980__ $$aEBOOK 001435554 982__ $$aEbook 001435554 983__ $$aOnline 001435554 994__ $$a92$$bISE