{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB29457541.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB29457541#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB29457541.json"},"dc:title":[{"@value":"Handbook of research on machine and deep learning applications for cyber security"}],"dc:creator":"Padmavathi Ganapathi, D. Shanmugapriya","dc:publisher":[{"@value":"IGI Global"}],"dcterms:extent":"xxiv, 482 p.","cinii:size":"29 cm","dc:language":"eng","dc:date":"2020","cinii:ncid":"BB29457541","cinii:ownerCount":"5","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Ganapathi, Padmavathi"}]},{"@type":"foaf:Person","foaf:name":[{"@value":"Shanmugapriya, D."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001415","@type":"foaf:Organization","foaf:name":"東北大学 附属図書館 工学分館","rdfs:seeAlso":{"@id":"https://opac.library.tohoku.ac.jp/opac/opac_openurl/?ncid=BB29457541"}},{"@id":"https://ci.nii.ac.jp/library/FA022743","@type":"foaf:Organization","foaf:name":"京都大学 大学院 情報学研究科","rdfs:seeAlso":{"@id":"https://kuline.kulib.kyoto-u.ac.jp/opac/opac_openurl/?ncid=BB29457541"}},{"@id":"https://ci.nii.ac.jp/library/FA004901","@type":"foaf:Organization","foaf:name":"麗澤大学 図書館","rdfs:seeAlso":{"@id":"https://library.reitaku-u.ac.jp/mylimedio/search/search.do?target=local&mode=comp&category-mgz=1&category-book=1&annex=all&ncid=BB29457541"}},{"@id":"https://ci.nii.ac.jp/library/FA005085","@type":"foaf:Organization","foaf:name":"北里大学 中央図書館","rdfs:seeAlso":{"@id":"http://saosrv.kitasato-u.ac.jp/opac/opac_openurl/?ncid=BB29457541"}},{"@id":"https://ci.nii.ac.jp/library/FA028557","@type":"foaf:Organization","foaf:name":"東京情報デザイン専門職大学 附属図書館","rdfs:seeAlso":{"@id":"https://lib-finder.net/tid/search?ncid=BB29457541"}}],"prism:publicationDate":["c2020"],"cinii:note":["Includes bibliographical references (p. 437-471) and index"],"dc:subject":["LCC:TK5105.59","DC23:006.3/1"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security+--+Data+processing","dc:title":"Computer security -- Data processing"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+crimes+--+Prevention+--+Data+processing","dc:title":"Computer crimes -- Prevention -- Data processing"},{"@id":"https://ci.nii.ac.jp/books/search?q=Machine+learning","dc:title":"Machine learning"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BB20391433#entity","dc:title":"Advances in information security, privacy, and ethics (AISPE) book series","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781522596110","dc:title":": hardcover"}]}]}