Intrusion detection : a machine learning approach /

Saved in:
Bibliographic Details
Author / Creator:Yu, Zhenwei.
Imprint:London : Imperial College Press ; Singapore ; Hackensack, NJ : Distributed by World Scientific Pub. Co., ©2011.
Description:1 online resource (xii, 171 pages) : illustrations.
Language:English
Series:Series in electrical and computer engineering ; vol. 3
Series in electrical and computer engineering ; v. 3.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11098980
Hidden Bibliographic Details
Other authors / contributors:Tsai, Jeffrey J.-P.
ISBN:9781848164482
1848164483
9781848164475
1848164475
Notes:Includes bibliographical references (pages 159-167) and index.
Print version record.
Summary:This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.
Other form:Print version: Yu, Zhenwei. Intrusion detection. London : Imperial College Press, ©2011 9781848164475
Standard no.:9786613148193

MARC

LEADER 00000cam a2200000Ia 4500
001 11098980
006 m o d
007 cr cnu---unuuu
008 110726s2011 enka ob 001 0 eng d
005 20240708194813.3
010 |a  2012405233 
019 |a 740620007  |a 1055379121  |a 1066533210  |a 1081226068  |a 1086536675 
020 |a 9781848164482  |q (electronic bk.) 
020 |a 1848164483  |q (electronic bk.) 
020 |z 9781848164475 
020 |z 1848164475 
024 8 |a 9786613148193 
035 |a (OCoLC)742590401  |z (OCoLC)740620007  |z (OCoLC)1055379121  |z (OCoLC)1066533210  |z (OCoLC)1081226068  |z (OCoLC)1086536675 
035 9 |a (OCLCCM-CC)742590401 
037 |a 314819  |b MIL 
040 |a N$T  |b eng  |e pn  |c N$T  |d CDX  |d E7B  |d YDXCP  |d OCLCQ  |d I9W  |d UIU  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d NLGGC  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCA  |d STF  |d VTS  |d VT2  |d OCLCQ  |d WYU  |d JBG  |d M8D  |d UKAHL 
049 |a MAIN 
050 4 |a TK5105.59  |b .Y89 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
100 1 |a Yu, Zhenwei.  |0 http://id.loc.gov/authorities/names/nb2011008652 
245 1 0 |a Intrusion detection :  |b a machine learning approach /  |c Zhenwei Yu, Jeffrey J.P. Tsai. 
260 |a London :  |b Imperial College Press ;  |a Singapore ;  |a Hackensack, NJ :  |b Distributed by World Scientific Pub. Co.,  |c ©2011. 
300 |a 1 online resource (xii, 171 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Series in electrical and computer engineering ;  |v vol. 3 
504 |a Includes bibliographical references (pages 159-167) and index. 
505 0 |a Introduction -- Attacks and countermeasures in computer security -- Machine learning methods -- Intrusion detection system -- Intrusion detection for wired network. Techniques for intrusion detection -- Adaptive automatically tuning intrusion detection system -- System prototype and performance evaluation -- Intrusion detection for wireless sensor network. Attacks against wireless sensor network. Intrusion detection system for wireless sensor network. Attacks against wireless sensor network -- Intrusion detection system for wireless sensor network -- Conclusion and future research. 
588 0 |a Print version record. 
520 |a This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included. 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 0 |a Computer security. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 4 |a Electronic books. 
655 0 |a Electronic books. 
700 1 |a Tsai, Jeffrey J.-P.  |0 http://id.loc.gov/authorities/names/n94052195 
776 0 8 |i Print version:  |a Yu, Zhenwei.  |t Intrusion detection.  |d London : Imperial College Press, ©2011  |z 9781848164475  |w (OCoLC)377754614 
830 0 |a Series in electrical and computer engineering ;  |v v. 3.  |0 http://id.loc.gov/authorities/names/no2003123710 
903 |a HeVa 
929 |a oclccm 
999 f f |i f9bcea97-6b40-51c7-857b-2f847c4e0be8  |s 40cc1a4e-491d-59c0-bd0d-7176d49fb01d 
928 |t Library of Congress classification  |a TK5105.59 .Y89 2011eb  |l Online  |c UC-FullText  |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=373215  |z eBooks on EBSCOhost  |g ebooks  |i 12352947