Bibliographie
- Stamp, M. (2017). Introduction to machine learning with applications in information security. Chapman and Hall/CRC.
- Halder, S., & Ozdemir, S. (2018). Hands-On Machine Learning for Cybersecurity : Safeguard your system by making your machines intelligent using the Python ecosystem. Packt Publishing Ltd.
- Parisi, A. (2019). Hands-on artificial intelligence for Cybersecurity : Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies. Packt Publishing Ltd.
- Sengupta, N., & Sil, J. (2020). Intrusion Detection : A Data Mining Approach. Springer Nature.
- Charniak, E. (2021). Introduction au deep learning. Dunod.
- Bouaziz, M. (2017). Réseaux de neurones récurrents pour la classification de séquences dans des flux audiovisuels parallèles (Doctoral dissertation, Université d'Avignon).
- Goodfellow, I. (2016). Deep Learning-Ian Goodfellow, Yoshua Bengio, Aaron Courville- Google Books.
- Mandic, D., & Chambers, J. (2001). Recurrent neural networks for prediction : learning algorithms, architectures and stability. Wiley.
- Touzet, C. (1992). Les réseaux de neurones artificiels : Introduction au connexionnisme : Cours. Exercices et travaux pratiques. (Disponible online :) http ://www.touzet.org/Claude/Web- Fac-Claude/Les_reseaux_de_neurones_artificiels.pdf
Modifié le: Saturday 16 November 2024, 11:40