This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques t
As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats. We need to use multiple types of tools and techniques to lear
This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book co
This book encompasses a systematic exploration of Cybersecurity Data Science (CSDS) as an emerging profession, focusing on current versus idealized practice. Th
This book constitutes the proceedings of the Second International Conference on Machine Learning for Cyber Security, ML4CS 2019, held in Xi’an, China in Septe