Fr. 147.00

Deep Learning in Textual Low-Data Regimes for Cybersecurity

Englisch · Taschenbuch

Versand in der Regel in 6 bis 7 Wochen

Beschreibung

Mehr lesen

In today's fast-paced cybersecurity landscape, professionals are increasingly challenged by the vast volumes of cyber threat data, making it difficult to identify and mitigate threats effectively. Traditional clustering methods help in broadly categorizing threats but fall short when it comes to the fine-grained analysis necessary for precise threat management. Supervised machine learning offers a potential solution, but the rapidly changing nature of cyber threats renders static models ineffective and the creation of new models too labor-intensive. This book addresses these challenges by introducing innovative low-data regime methods that enhance the machine learning process with minimal labeled data. The proposed approach spans four key stages:

Data Acquisition: Leveraging active learning with advanced models like GPT-4 to optimize data labeling.
Preprocessing: Utilizing GPT-2 and GPT-3 for data augmentation to enrich and diversify datasets.
Model Selection: Developing a specialized cybersecurity language model and using multi-level transfer learning.
Prediction: Introducing a novel adversarial example generation method, grounded in explainable AI, to improve model accuracy and resilience.

Inhaltsverzeichnis

Introduction.- Research Design.- Findings.- Discussion.- Conclusion.- Information Overload in Crisis Management: Bilingual Evaluation of Embedding Models for Clustering Social Media Posts in Emergencies.- ActiveLLM: Large Language Model-based Active Learning for Textual Few-Shot Scenarios.- A Survey on Data Augmentation for Text Classification.- Data Augmentation in Natural Language Processing: A Novel Text Generation Approach for Long and Short Text Classifiers.- Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter.- CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain.- Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence.- XAI-Attack: Utilizing Explainable AI to Find Incorrectly Learned Patterns for Black-Box Adversarial Example Creation.

Über den Autor / die Autorin

Dr. rer. nat. Markus Bayer is a research associate and post-doctoral researcher at the Chair of Science and Technology for Peace and Security (PEASEC) in the Department of Computer Science at the Technical University of Darmstadt.

Zusammenfassung

In today's fast-paced cybersecurity landscape, professionals are increasingly challenged by the vast volumes of cyber threat data, making it difficult to identify and mitigate threats effectively. Traditional clustering methods help in broadly categorizing threats but fall short when it comes to the fine-grained analysis necessary for precise threat management. Supervised machine learning offers a potential solution, but the rapidly changing nature of cyber threats renders static models ineffective and the creation of new models too labor-intensive. This book addresses these challenges by introducing innovative low-data regime methods that enhance the machine learning process with minimal labeled data. The proposed approach spans four key stages:

Data Acquisition: Leveraging active learning with advanced models like GPT-4 to optimize data labeling.
Preprocessing: Utilizing GPT-2 and GPT-3 for data augmentation to enrich and diversify datasets.
Model Selection: Developing a specialized cybersecurity language model and using multi-level transfer learning.
Prediction: Introducing a novel adversarial example generation method, grounded in explainable AI, to improve model accuracy and resilience.

Produktdetails

Autoren Markus Bayer
Verlag Springer, Berlin
 
Sprache Englisch
Produktform Taschenbuch
Erschienen 13.03.2026
 
EAN 9783658487775
ISBN 978-3-658-48777-5
Seiten 347
Abmessung 148 mm x 20 mm x 210 mm
Gewicht 486 g
Illustration XXVIII, 347 p. 45 illus., 35 illus. in color. Textbook for German language market.
Serie Technology, Peace and Security I Technologie, Frieden und Sicherheit
Themen Naturwissenschaften, Medizin, Informatik, Technik > Technik > Allgemeines, Lexika

Computersicherheit, Netzwerksicherheit, machine learning, Maschinelles Lernen, Deep Learning, Cybersecurity, Data and Information Security, Mathematical and Computational Engineering Applications, Transfer Learning, active learning, cyber threat intelligence, Data Augmentation, Adversarial Examples, Low-Data Regimes

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.