Reference Hub1
Indices1
Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security

Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security

Copyright: © 2021 |Pages: 355
ISBN13: 9781799832997|ISBN10: 1799832996|EISBN13: 9781799833017
DOI: 10.4018/978-1-7998-3299-7
Cite Book Cite Book

MLA

Dua, Mohit, and Ankit Kumar Jain, editors. Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security. IGI Global, 2021. https://doi.org/10.4018/978-1-7998-3299-7

APA

Dua, M. & Jain, A. K. (Eds.). (2021). Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security. IGI Global. https://doi.org/10.4018/978-1-7998-3299-7

Chicago

Dua, Mohit, and Ankit Kumar Jain, eds. Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-3299-7

Export Reference

Mendeley
Favorite Full-Book Download

The artificial intelligence subset machine learning has become a popular technique in professional fields as many are finding new ways to apply this trending technology into their everyday practices. Two fields that have majorly benefited from this are pattern recognition and information security. The ability of these intelligent algorithms to learn complex patterns from data and attain new performance techniques has created a wide variety of uses and applications within the data security industry. There is a need for research on the specific uses machine learning methods have within these fields, along with future perspectives.

The Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security is a collection of innovative research on the current impact of machine learning methods within data security as well as its various applications and newfound challenges. While highlighting topics including anomaly detection systems, biometrics, and intrusion management, this book is ideally designed for industrial experts, researchers, IT professionals, network developers, policymakers, computer scientists, educators, and students seeking current research on implementing machine learning tactics to enhance the performance of information security.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Computational Intelligence and Robotics (ACIR) Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.