取之不竭 发表于 2025-3-23 09:59:14

Tony Thomas,Athira P. Vijayaraghavan,Sabu Emmanuel

Collar 发表于 2025-3-23 16:34:28

Tony Thomas,Athira P. Vijayaraghavan,Sabu Emmanuel

男生戴手铐 发表于 2025-3-23 19:11:03

http://reply.papertrans.cn/63/6204/620387/620387_13.png

Inflammation 发表于 2025-3-24 00:40:55

http://reply.papertrans.cn/63/6204/620387/620387_14.png

热情赞扬 发表于 2025-3-24 03:28:49

Introduction to Machine Learning, For example, predicting whether an android application is a malware or goodware during a malware detection process is a classification task, whereas estimating the threat level of a system is a regression task.

MARS 发表于 2025-3-24 07:07:19

http://reply.papertrans.cn/63/6204/620387/620387_16.png

失望未来 发表于 2025-3-24 13:10:47

http://reply.papertrans.cn/63/6204/620387/620387_17.png

假装是我 发表于 2025-3-24 15:04:18

Book 2020ed over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify th

欢乐中国 发表于 2025-3-24 19:03:15

http://reply.papertrans.cn/63/6204/620387/620387_19.png

加剧 发表于 2025-3-24 23:32:57

Support Vector Machines and Malware Detection,re used in predicting continuous values, and classification models are used in predicting which class a data point is part of. SVMs are mostly used for solving classification problems. At the end of this chapter, we also demonstrate the classification of malware from benign ones.
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Machine Learning Approaches in Cyber Security Analytics; Tony Thomas,Athira P. Vijayaraghavan,Sabu Emmanuel Book 2020 Springer Nature Sing