Responsible Graph Neural Networks Responsible Graph Neural Networks

Responsible Graph Neural Networks

    • 57,99 €
    • 57,99 €

Description de l’éditeur

More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete study in the area of graph learning in cyber, emphasizing graph neural networks (GNNs) and their cyber-security applications.

Three parts examine the basics, methods and practices, and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber-security applications. The second part explains three different categories of graph learning, including deterministic, generative, and reinforcement learning and how they can be used for developing cyber defense models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms, and technical details.

Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

GENRE
Informatique et Internet
SORTIE
2023
5 juin
LANGUE
EN
Anglais
LONGUEUR
323
Pages
ÉDITIONS
CRC Press
TAILLE
5,8
Mo
Artificial Intelligence and Internet of Things in Smart Farming Artificial Intelligence and Internet of Things in Smart Farming
2024
Application of Advanced Optimization Techniques for Healthcare Analytics Application of Advanced Optimization Techniques for Healthcare Analytics
2023
Multi-Criteria Decision Making Theory and Applications in Sustainable Healthcare Multi-Criteria Decision Making Theory and Applications in Sustainable Healthcare
2023
Deep Learning Approaches for Security Threats in IoT Environments Deep Learning Approaches for Security Threats in IoT Environments
2022
Soft Computing for Smart Environments Soft Computing for Smart Environments
2023
Deep Learning Techniques for IoT Security and Privacy Deep Learning Techniques for IoT Security and Privacy
2021