語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information fusion for cyber-securit...
~
Alsmadi, Izzat M.
FindBook
Google Book
Amazon
博客來
Information fusion for cyber-security analytics
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information fusion for cyber-security analytics/ edited by Izzat M Alsmadi, George Karabatis, Ahmed Aleroud.
其他作者:
Alsmadi, Izzat M.
出版者:
Cham :Springer International Publishing : : 2017.,
面頁冊數:
x, 379 p. :ill. (some col.), digital ;24 cm.
內容註:
Introduction -- Part 1: Information Fusion for Cyber-Security Analytics -- Activity Information Fusion for Security Analytics -- Location Information Fusion for Security Analytics -- Time Information Fusion for Security Analytics -- Individuality Information Fusion for Security Analytics -- Relation Information Fusion for Security Analytics -- Part 2: Trends in Using Information Fusion Techniques to Discover Cyber Threats -- Big Data Fusion for Predicting Network Threats -- Using Software Defined Networks for Cyber Threat Discovery -- Privacy Preserving Information Fusion for Analyzing Network Data -- Using Information Fusion to Discover Zero-Day Attacks -- Enhancing Social Network Privacy and Security Using Graph-based Data Fusion -- Using Information Fusion to discover Cyber-threats in Wireless Sensor Networks -- Information Fusion for Improving Privacy and Security in Healthcare Applications -- Predicting Social Engineering Attacks Using Information Fusion Techniques -- Part 3: Applications and tools. -Information Fusion Application and Tools for Cyber Security Analytics -- Conclusion.
Contained By:
Springer eBooks
標題:
Intrusion detection systems (Computer security) -
電子資源:
http://dx.doi.org/10.1007/978-3-319-44257-0
ISBN:
9783319442570
Information fusion for cyber-security analytics
Information fusion for cyber-security analytics
[electronic resource] /edited by Izzat M Alsmadi, George Karabatis, Ahmed Aleroud. - Cham :Springer International Publishing :2017. - x, 379 p. :ill. (some col.), digital ;24 cm. - Studies in computational intelligence,v.6911860-949X ;. - Studies in computational intelligence ;v.691..
Introduction -- Part 1: Information Fusion for Cyber-Security Analytics -- Activity Information Fusion for Security Analytics -- Location Information Fusion for Security Analytics -- Time Information Fusion for Security Analytics -- Individuality Information Fusion for Security Analytics -- Relation Information Fusion for Security Analytics -- Part 2: Trends in Using Information Fusion Techniques to Discover Cyber Threats -- Big Data Fusion for Predicting Network Threats -- Using Software Defined Networks for Cyber Threat Discovery -- Privacy Preserving Information Fusion for Analyzing Network Data -- Using Information Fusion to Discover Zero-Day Attacks -- Enhancing Social Network Privacy and Security Using Graph-based Data Fusion -- Using Information Fusion to discover Cyber-threats in Wireless Sensor Networks -- Information Fusion for Improving Privacy and Security in Healthcare Applications -- Predicting Social Engineering Attacks Using Information Fusion Techniques -- Part 3: Applications and tools. -Information Fusion Application and Tools for Cyber Security Analytics -- Conclusion.
This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.
ISBN: 9783319442570
Standard No.: 10.1007/978-3-319-44257-0doiSubjects--Topical Terms:
1085454
Intrusion detection systems (Computer security)
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Information fusion for cyber-security analytics
LDR
:03120nmm a2200325 a 4500
001
2088114
003
DE-He213
005
20161021112347.0
006
m d
007
cr nn 008maaau
008
171013s2017 gw s 0 eng d
020
$a
9783319442570
$q
(electronic bk.)
020
$a
9783319442563
$q
(paper)
024
7
$a
10.1007/978-3-319-44257-0
$2
doi
035
$a
978-3-319-44257-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.I43 2017
245
0 0
$a
Information fusion for cyber-security analytics
$h
[electronic resource] /
$c
edited by Izzat M Alsmadi, George Karabatis, Ahmed Aleroud.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
x, 379 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Studies in computational intelligence,
$x
1860-949X ;
$v
v.691
505
0
$a
Introduction -- Part 1: Information Fusion for Cyber-Security Analytics -- Activity Information Fusion for Security Analytics -- Location Information Fusion for Security Analytics -- Time Information Fusion for Security Analytics -- Individuality Information Fusion for Security Analytics -- Relation Information Fusion for Security Analytics -- Part 2: Trends in Using Information Fusion Techniques to Discover Cyber Threats -- Big Data Fusion for Predicting Network Threats -- Using Software Defined Networks for Cyber Threat Discovery -- Privacy Preserving Information Fusion for Analyzing Network Data -- Using Information Fusion to Discover Zero-Day Attacks -- Enhancing Social Network Privacy and Security Using Graph-based Data Fusion -- Using Information Fusion to discover Cyber-threats in Wireless Sensor Networks -- Information Fusion for Improving Privacy and Security in Healthcare Applications -- Predicting Social Engineering Attacks Using Information Fusion Techniques -- Part 3: Applications and tools. -Information Fusion Application and Tools for Cyber Security Analytics -- Conclusion.
520
$a
This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.
650
0
$a
Intrusion detection systems (Computer security)
$3
1085454
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Engineering.
$3
586835
650
2 4
$a
Communications Engineering, Networks.
$3
891094
650
2 4
$a
Circuits and Systems.
$3
896527
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Big Data/Analytics.
$3
2186785
700
1
$a
Alsmadi, Izzat M.
$3
3217582
700
1
$a
Karabatis, George.
$3
3217583
700
1
$a
Aleroud, Ahmed.
$3
3217584
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Studies in computational intelligence ;
$v
v.691.
$3
3217585
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-44257-0
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9314286
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入