Reprint

Symmetry-Adapted Machine Learning for Information Security

Edited by
August 2020
202 pages
  • ISBN978-3-03936-642-2 (Hardback)
  • ISBN978-3-03936-643-9 (PDF)

This book is a reprint of the Special Issue Symmetry-Adapted Machine Learning for Information Security that was published in

Biology & Life Sciences
Chemistry & Materials Science
Computer Science & Mathematics
Physical Sciences
Summary

Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis.

Format
  • Hardback
License
© 2020 by the authors; CC BY-NC-ND license
Keywords
BM123-64; hybrid controlled substitution–permutation network (CSPN); switchable data-dependent operations (SDDOs); cryptanalysis; related-key amplified boomerang attack; Internet of things (IoT); location-based service (LBS); indoor localization; beacon; received signal strength indication (RSSI); Kalman filter; average filter; network function virtualization; service function chain; reinforcement learning; load balancing; security; Dynamic job-shop; Parallel Machines; Maximum flow-time of components; Genetic Algorithm; IP camera; IP camera security; NVR security; video security; intrusion detection system; deep learning; Spark ML; CNN; LSTM; Conv-LSTM; machine vision; aggregation behavior; convolutional neural network; video; action recognition; color image watermarking; copyright protection; robustness; all phase discrete cosine biorthogonal transform (APDCBT); shuffled singular value decomposition (SSVD); Fibonacci transform; deep Q-network (DQN); reinforcement learning (RL); explorations; deep deterministic policy gradient (DDPG); random ε-greedy buffers; fast Walsh–Hadamard transform; Gaussian mapping; singular value decomposition; coefficient ordering; key mapping; intrusion detection; machine learning; classification; knowledge modelling; malware detection; deep learning; CNN; PCA; dimension reduction; linear transform; Simhash encoding; LSH; symmetrical covariance matrix; symmetry; intrusion detection system; machine learning; image watermarking; information security; IoT security; indoor positioning system