10 machine learning blueprints you should know for cybersecurity protect your systems and boost your defenses with cutting-edge AI techniques
Work on 10 practical projects, each with a blueprint for a different machine learning technique, and apply them in the real world to fight against cybercrime Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn how to frame a cyber security problem as a machine learning...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, England :
Packt Publishing
[2023]
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009752719806719 |
Tabla de Contenidos:
- Table of Contents On Cybersecurity and Machine Learning Detecting Suspicious Activity Malware Detection Using Transformers and BERT Detecting Fake Reviews Detecting Deepfakes Detecting Machine-Generated Text Attributing Authorship and How to Evade it Detecting Fake News with Graph Neural Networks Attacking Models with Adversarial Machine Learning Protecting User Privacy with Differential Privacy Protecting User Privacy with Federated Machine Learning Breaking into the Sec-ML Industry.