Search Results for - Narrowed by: Computer networks -- Security measures. - Computer security. - Machine learning.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Machine$002blearning.$002509Machine$002blearning.$0026ps$003d300?
2024-06-20T05:49:18Z
Fraud detection without feature engineering
ent://SD_ILS/0/SD_ILS:2322434
2024-06-20T05:49:18Z
2024-06-20T05:49:18Z
by Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format: Electronic Resources<br/>
Security with AI and machine learning : using advanced tools to improve application security at the edge
ent://SD_ILS/0/SD_ILS:2319058
2024-06-20T05:49:18Z
2024-06-20T05:49:18Z
by Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format: Electronic Resources<br/>
Preparing and exploring security data for machine learning.
ent://SD_ILS/0/SD_ILS:2334770
2024-06-20T05:49:18Z
2024-06-20T05:49:18Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032335">https://learning.oreilly.com/videos/~/9781492032335</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032335/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492032335/?ar">https://learning.oreilly.com/videos/~/9781492032335/?ar</a><br/>Format: Video recording<br/>
Supervised machine learning in security applications.
ent://SD_ILS/0/SD_ILS:2334773
2024-06-20T05:49:18Z
2024-06-20T05:49:18Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032410">https://learning.oreilly.com/videos/~/9781492032410</a>
<a href="https://learning.oreilly.com/videos/~/9781492032410/?ar">https://learning.oreilly.com/videos/~/9781492032410/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032410/?ar</a><br/>Format: Video recording<br/>
Unsupervised machine learning in security applications.
ent://SD_ILS/0/SD_ILS:2334784
2024-06-20T05:49:18Z
2024-06-20T05:49:18Z
by Givre, Charles, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781492032373">https://learning.oreilly.com/videos/~/9781492032373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032373/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492032373/?ar">https://learning.oreilly.com/videos/~/9781492032373/?ar</a><br/>Format: Video recording<br/>