MARC details
000 -LEADER |
fixed length control field |
01623nam a22002777a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240115092438.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210924b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
184628029X (cased) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781846280290 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BUL |
Transcribing agency |
BUL |
Modifying agency |
BUL |
Language of cataloging |
eng |
Description conventions |
rda |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23 |
Classification number |
005.8 |
Item number |
MAC |
245 00 - TITLE STATEMENT |
Title |
Machine learning and data mining for computer security : |
Remainder of title |
methods and applications / |
Statement of responsibility, etc. |
edited by Marcus A. Maloof |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
London : |
Name of publisher, distributor, etc. |
Springer, |
Date of publication, distribution, etc. |
c2006. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 210 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Advanced information and knowledge processing |
500 ## - GENERAL NOTE |
General note |
CONTENTS<br/><br/>Introduction.- <br/><br/>PART I: SURVEY CONTRIBUTIONS<br/>An Introduction to Information Assurance<br/>Some Basic Concepts of Machine Learning and Data Mining.- <br/><br/>PART II: RESEARCH CONTRIBUTIONS<br/>Learning to Detect Malicious Executables.- <br/>Data Mining Applied to Intrusion Detection: MITRE Experiences.- <br/>Intrusion Detection Alarm Clustering.- <br/>Behavioural Features for Network Anomaly Detection.- <br/>Cost-sensitive Modeling for Intrusion Detection.- <br/>Data Cleaning and Enriched Representations for Anomaly Detection in System Calls.- <br/>A Decision-Theoretic, Semi-supervised Model for Intrusion Detection. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (p. [179]-198) and index P. 199-210 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Machine learning. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data mining. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Maloof, Marcus A. |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents only |
Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/enhancements/fy0813/2005928487-t.html">http://www.loc.gov/catdir/enhancements/fy0813/2005928487-t.html</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book Closed Access |
Classification part |
005.8 |
Item part |
1 |
Call number prefix |
MAC |
Call number suffix |
005.8 MAC |