Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Big Data Analytics with Applications in Insider Threat Detection - Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan

Big Data Analytics with Applications in Insider Threat Detection

Buch | Softcover
544 Seiten
2020
CRC Press (Verlag)
978-0-367-65742-0 (ISBN)
CHF 78,50 inkl. MwSt
Antivirus software uses algorithms to detect viruses Reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud framework, and the applications for insider threat detection.
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Dr. Bhavani Thuraisingham is the Louis A. Beecherl, Jr. Distinguished Professor of Computer Science and the Executive Director of the Cyber Security Research and Education Institute (CSI) at the University of Texas at Dallas. Dr. Kevin W. Hamlen is an Assistant Professor in CS at UTD where he directs the Software Security Lab. Dr. Latifur R. Khan is currently an Associate Professor in CS at UTD. Dr. Mehedy Masud is an associate professor at the College of Information Technology, United Arab Emirates University.

Supporting Technologies. Introduction. Data Mining Techniques. Cyber Security and Malware. Data Mining for Malware Detection. Conclusion. Stream-Based Novel Class Detection. Stream Mining. Novel Class Detection Problem. SNOD. Conclusion. Reactively Adaptive Malware. Reactively Adaptive Malware. RAMAL Design. RAMAL Implementation. SNODMAL. Introduction. SNODMAL Design. SNODMAL Implementation. SNODMAL FOR RAMAL. SNODMAL Extensions. Introduction. SNODMAL on the Cloud. SNODCAL. SNODMAL++. Conclusion. Summary and Directions. References. Appendix A: Data Management Systems. Appendix B: Malware Products.

Erscheinungsdatum
Verlagsort London
Sprache englisch
Maße 178 x 254 mm
Gewicht 453 g
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
ISBN-10 0-367-65742-2 / 0367657422
ISBN-13 978-0-367-65742-0 / 9780367657420
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Von den Grundlagen bis zum Produktiveinsatz

von Anatoly Zelenin; Alexander Kropp

Buch (2025)
Hanser (Verlag)
CHF 69,95