-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

10 Machine Learning Blueprints You Should Know for Cybersecurity
By :

As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.
A
activation function 47
activation map 114
adjacency matrix 183
adversarial attacks, on intrusion detection
CICIDS2017 dataset 292
NSL-KDD dataset 291
UNB ISCX IDS 2012 dataset 292
adversarial attacks 228
robustness, developing against 228
adversarial attack strategies 222
last letter, doubling 222
vowel, doubling 223
adversarial tactics 207
data poisoning attacks 208
input perturbation attacks 207, 208
model inversion attacks 208
adversarial training 228
aggregator 260
alternate hypothesis (Ha) 93
alternative hypothesis (H1) 90
Analysis of Variance (ANOVA) 97
anomaly 20
apply() function 90
Area under the ROC...