• 0 5391 6310 , 0 5391 6320
  • acquisition_library@mfu.ac.th
  • BOOK
  • E-BOOK
        
  • Log in
  • HOME
  • CATEGORY
    • Agro-Industry
    • Anti Aging and Regenerative Medicine
    • Applied Digital Technology
    • Cosmetic Science
    • Dentistry
    • General Books
    • Health Science
    • Integrative Medicine
    • Law
    • Liberal Arts
    • Management
    • Medicine
    • Nursing
    • Science
    • Sinology
    • Social Innovations
  • BOOKFAIR WEBSITE
  • MANUAL

Category

Agro-Industry

Anti Aging and Regenerative Medicine

Applied Digital Technology

Cosmetic Science

Dentistry

Health Science

Integrative Medicine

Law

Liberal Arts

Management

Medicine

Nursing

Science

Sinology

Social Innovations

General Books

E-Book

10 Machine Learning Blueprints You Should Know for Cybersecurity

ISBN : 9781804611975

Author : Rajvardhan Oak

Publisher : Packt Publishing

Year : 2023

Language : English

Type : E-book

Description : Work on 10 practical projects, each with a blueprint for a different machine learning technique, and apply them in the real world to fight against cybercrimePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn how to frame a cyber security problem as a machine learning problemExamine your model for robustness against adversarial machine learningBuild your portfolio, enhance your resume, and ace interviews to become a cybersecurity data scientistBook DescriptionMachine learning in security is harder than other domains because of the changing nature and abilities of adversaries, high stakes, and a lack of ground-truth data. This book will prepare machine learning practitioners to effectively handle tasks in the challenging yet exciting cybersecurity space.The book begins by helping you understand how advanced ML algorithms work and shows you practical examples of how they can be applied to security-specific problems with Python – by using open source datasets or instructing you to create your own. In one exercise, you’ll also use GPT 3.5, the secret sauce behind ChatGPT, to generate an artificial dataset of fabricated news. Later, you’ll find out how to apply the expert knowledge and human-in-the-loop decision-making that is necessary in the cybersecurity space. This book is designed to address the lack of proper resources available for individuals interested in transitioning into a data scientist role in cybersecurity. It concludes with case studies, interview questions, and blueprints for four projects that you can use to enhance your portfolio.By the end of this book, you’ll be able to apply machine learning algorithms to detect malware, fake news, deep fakes, and more, along with implementing privacy-preserving machine learning techniques such as differentially private ML.What you will learnUse GNNs to build feature-rich graphs for bot detection and engineer graph-powered embeddings and featuresDiscover how to apply ML techniques in the cybersecurity domainApply state-of-the-art algorithms such as transformers and GNNs to solve security-related issuesLeverage ML to solve modern security issues such as deep fake detection, machine-generated text identification, and stylometric analysisApply privacy-preserving ML techniques and use differential privacy to protect user data while training ML modelsBuild your own portfolio with end-to-end ML projects for cybersecurityWho this book is forThis book is for machine learning practitioners interested in applying their skills to solve cybersecurity issues. Cybersecurity workers looking to leverage ML methods will also find this book useful. An understanding of the fundamental machine learning concepts and beginner-level knowledge of Python programming are needed to grasp the concepts in this book. Whether you’re a beginner or an experienced professional, this book offers a unique and valuable learning experience that’ll help you develop the skills needed to protect your network and data against the ever-evolving threat landscape.Table of ContentsOn Cybersecurity and Machine LearningDetecting Suspicious ActivityMalware Detection Using Transformers and BERTDetecting Fake ReviewsDetecting DeepfakesDetecting Machine-Generated TextAttributing Authorship and How to Evade itDetecting Fake News with Graph Neural NetworksAttacking Models with Adversarial Machine LearningProtecting User Privacy with Differential PrivacyProtecting User Privacy with Federated Machine LearningBreaking into the Sec-ML Industry

Please register to recommend this book to the library.

RECOMMENDED BOOKS

Consciousness An Introduction

Susan Blackmore

  • Detail

Sustaining the Global Agriculture Supply Chain

Sneha Kumari

  • Detail

Calculus: Formulations And Solutions With Python

G R Liu

  • Detail

Understanding Bilingualism, Bilinguality, and Bilingual Education in an Era of Globalization

Ai-Ling Wang

  • Detail

Financial Services Marketing: A Guide to Principles and Practice

Christine Ennew

  • Detail

Global Business Connecting Theory to Reality

Yongsun Paik

  • Detail

Diagnosis And Treatment Of Covid-19 With Integrated Chinese And Western Medicine

Boli Zhang

  • Detail

Handbook of Speech Recognition

Warren Hanna

  • Detail

Learning Reources and Education Media Centre - Mae Fah Luang University