Artificial Intelligence and Data Mining Approaches in Security Frameworks. Группа авторов

Отраслевые издания.

Скачать книгу
Читать онлайн

Artificial Intelligence and Data Mining Approaches in Security Frameworks


Год выпуска 0

isbn 9781119760436

Автор произведения Группа авторов

Жанр Отраслевые издания

Серия

Издательство John Wiley & Sons Limited


Artificial intelligence (AI) and data mining is the fastest growing field in computer science. AI and data mining algorithms and techniques are found to be useful in different areas like pattern recognition, automatic threat detection, automatic problem solving, visual recognition, fraud detection, detecting developmental delay in children, and many other applications. However, applying AI and data mining techniques or algorithms successfully in these areas needs a concerted effort, fostering integrative research between experts ranging from diverse disciplines from data science to Artificial Intelligence. Successful application of security frameworks to enable meaningful, cost effective, personalize security service is a primary aim of engineers and researchers today. However realizing this goal requires effective understanding, application and amalgamation of AI and Data Mining and several other computing technologies to deploy such system in an effective manner. This book provides state of the art approaches of artificial intelligence and data mining in these areas. It includes areas of detection, prediction, as well as future framework identification, development, building service systems and analytical aspects. In all these topics, applications of AI and data mining, such as artificial neural networks, fuzzy logic, genetic algorithm and hybrid mechanisms, are explained and explored. This book is aimed at the modeling and performance prediction of efficient security framework systems, bringing to light a new dimension in the theory and practice.  This groundbreaking new volume presents these topics and trends, bridging the research gap on AI and data mining to enable wide-scale implementation. Whether for the veteran engineer or the student, this is a must-have for any library.