Machine learning and data mining for computer security : (Record no. 6443)

MARC details
000 -LEADER
fixed length control field 01623nam a22002777a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240115092438.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210924b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 184628029X (cased)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781846280290
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Modifying agency BUL
Language of cataloging eng
Description conventions rda
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
Item number MAC
245 00 - TITLE STATEMENT
Title Machine learning and data mining for computer security :
Remainder of title methods and applications /
Statement of responsibility, etc. edited by Marcus A. Maloof
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. London :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. c2006.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 210 p. :
Other physical details ill. ;
Dimensions 24 cm.
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Advanced information and knowledge processing
500 ## - GENERAL NOTE
General note CONTENTS<br/><br/>Introduction.- <br/><br/>PART I: SURVEY CONTRIBUTIONS<br/>An Introduction to Information Assurance<br/>Some Basic Concepts of Machine Learning and Data Mining.- <br/><br/>PART II: RESEARCH CONTRIBUTIONS<br/>Learning to Detect Malicious Executables.- <br/>Data Mining Applied to Intrusion Detection: MITRE Experiences.- <br/>Intrusion Detection Alarm Clustering.- <br/>Behavioural Features for Network Anomaly Detection.- <br/>Cost-sensitive Modeling for Intrusion Detection.- <br/>Data Cleaning and Enriched Representations for Anomaly Detection in System Calls.- <br/>A Decision-Theoretic, Semi-supervised Model for Intrusion Detection.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. [179]-198) and index P. 199-210
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Machine learning.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data mining.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Maloof, Marcus A.
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of contents only
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/enhancements/fy0813/2005928487-t.html">http://www.loc.gov/catdir/enhancements/fy0813/2005928487-t.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Closed Access
Classification part 005.8
Item part 1
Call number prefix MAC
Call number suffix 005.8 MAC
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 09/24/2021 Purchased 0027677   005.8 MAC 1 BUML24010415 09/24/2021 1 09/24/2021 Book Closed Access