In the Signal processing section, we will discuss the different fields where time series are utilized to extract meaningful information from very large datasets. Be it social media analysis, click stream trends, or system log generations, time series can be used to mine any data that has a similar time-sensitive approach to data collection and storage.
-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Hands-On Machine Learning for Cybersecurity
By :

Hands-On Machine Learning for Cybersecurity
By:
Overview of this book
Cyber threats today are one of the costliest losses that an organization can face. In this book, we use the most efficient tool to solve the big problems that exist in the cybersecurity domain.
The book begins by giving you the basics of ML in cybersecurity using Python and its libraries. You will explore various ML domains (such as time series analysis and ensemble modeling) to get your foundations right. You will implement various examples such as building system to identify malicious URLs, and building a program to detect fraudulent emails and spam. Later, you will learn how to make effective use of K-means algorithm to develop a solution to detect and alert you to any malicious activity in the network. Also learn how to implement biometrics and fingerprint to validate whether the user is a legitimate user or not.
Finally, you will see how we change the game with TensorFlow and learn how deep learning is effective for creating models and training systems
Table of Contents (13 chapters)
Preface
In Progress
| 0 / 5 sections completed |
0%
Basics of Machine Learning in Cybersecurity
In Progress
| 0 / 3 sections completed |
0%
Time Series Analysis and Ensemble Modeling
In Progress
| 0 / 11 sections completed |
0%
Segregating Legitimate and Lousy URLs
In Progress
| 0 / 8 sections completed |
0%
Knocking Down CAPTCHAs
In Progress
| 0 / 4 sections completed |
0%
Using Data Science to Catch Email Fraud and Spam
In Progress
| 0 / 4 sections completed |
0%
Efficient Network Anomaly Detection Using k-means
In Progress
| 0 / 9 sections completed |
0%
Decision Tree and Context-Based Malicious Event Detection
In Progress
| 0 / 15 sections completed |
0%
Catching Impersonators and Hackers Red Handed
In Progress
| 0 / 5 sections completed |
0%
Changing the Game with TensorFlow
In Progress
| 0 / 10 sections completed |
0%
Financial Fraud and How Deep Learning Can Mitigate It
In Progress
| 0 / 5 sections completed |
0%
Case Studies
In Progress
| 0 / 3 sections completed |
0%
Other Books You May Enjoy
In Progress
| 0 / 2 sections completed |
0%
Customer Reviews