語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Handbook of big data analytics and f...
~
Choo, Kim-Kwang Raymond.
FindBook
Google Book
Amazon
博客來
Handbook of big data analytics and forensics
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Handbook of big data analytics and forensics/ edited by Kim-Kwang Raymond Choo, Ali Dehghantanha.
其他作者:
Choo, Kim-Kwang Raymond.
出版者:
Cham :Springer International Publishing : : 2022.,
面頁冊數:
viii, 287 p. :ill., digital ;24 cm.
內容註:
1. Big data analytics and forensics: an overview -- 2. Lot privacy, security and forensics challenges: an unmanned aerial vehicle (uav) case study -- 3. Detection of enumeration attacks in cloud environments using infrastructure log data -- 4 -- Cyber threat attribution with multi-view heuristic analysis -- 5. Security of industrial cyberspace: fair clustering with linear time approximation -- 6. Adaptive neural trees for attack detection in cyber physical systems -- 7. Evaluating performance of scalable fair clustering machine learning techniques in detecting cyber-attacks in industrial control systems -- 8. Fuzzy bayesian learning for cyber threat hunting in industrial control systems -- 9. Cyber-attack detection in cyber-physical systems using supervised machine learning -- 10. Evaluation of scalable fair clustering machine learning methods for threat hunting in cyber-physical systems -- 11. Evaluation of supervised and unsupervised machine learning classifiers for mac os malware detection -- 12. Evaluation of machine learning algorithms on internet of things (iot) malware opcodes -- 13. Mac os x malware detection with supervised machine learning algorithms -- 14. Machine learning for osx malware detection -- 15. Hybrid analysis on credit card fraud detection using machine learning techniques -- 16. Mapping ckc model through nlp modelling for apt groups reports -- 17. Ransomware threat detection: a deep learning approach -- 18. Scalable fair clustering algorithm for internet of things malware classification.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-030-74753-4
ISBN:
9783030747534
Handbook of big data analytics and forensics
Handbook of big data analytics and forensics
[electronic resource] /edited by Kim-Kwang Raymond Choo, Ali Dehghantanha. - Cham :Springer International Publishing :2022. - viii, 287 p. :ill., digital ;24 cm.
1. Big data analytics and forensics: an overview -- 2. Lot privacy, security and forensics challenges: an unmanned aerial vehicle (uav) case study -- 3. Detection of enumeration attacks in cloud environments using infrastructure log data -- 4 -- Cyber threat attribution with multi-view heuristic analysis -- 5. Security of industrial cyberspace: fair clustering with linear time approximation -- 6. Adaptive neural trees for attack detection in cyber physical systems -- 7. Evaluating performance of scalable fair clustering machine learning techniques in detecting cyber-attacks in industrial control systems -- 8. Fuzzy bayesian learning for cyber threat hunting in industrial control systems -- 9. Cyber-attack detection in cyber-physical systems using supervised machine learning -- 10. Evaluation of scalable fair clustering machine learning methods for threat hunting in cyber-physical systems -- 11. Evaluation of supervised and unsupervised machine learning classifiers for mac os malware detection -- 12. Evaluation of machine learning algorithms on internet of things (iot) malware opcodes -- 13. Mac os x malware detection with supervised machine learning algorithms -- 14. Machine learning for osx malware detection -- 15. Hybrid analysis on credit card fraud detection using machine learning techniques -- 16. Mapping ckc model through nlp modelling for apt groups reports -- 17. Ransomware threat detection: a deep learning approach -- 18. Scalable fair clustering algorithm for internet of things malware classification.
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs) The authors propose a deep learning-based approach to process cloud's log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter. The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS's cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS's cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated. This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters. This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.
ISBN: 9783030747534
Standard No.: 10.1007/978-3-030-74753-4doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / H348 2022
Dewey Class. No.: 005.8
Handbook of big data analytics and forensics
LDR
:05077nmm a2200325 a 4500
001
2295650
003
DE-He213
005
20211202020201.0
006
m d
007
cr nn 008maaau
008
230324s2022 sz s 0 eng d
020
$a
9783030747534
$q
(electronic bk.)
020
$a
9783030747527
$q
(paper)
024
7
$a
10.1007/978-3-030-74753-4
$2
doi
035
$a
978-3-030-74753-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
H348 2022
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
H236 2022
245
0 0
$a
Handbook of big data analytics and forensics
$h
[electronic resource] /
$c
edited by Kim-Kwang Raymond Choo, Ali Dehghantanha.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
viii, 287 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1. Big data analytics and forensics: an overview -- 2. Lot privacy, security and forensics challenges: an unmanned aerial vehicle (uav) case study -- 3. Detection of enumeration attacks in cloud environments using infrastructure log data -- 4 -- Cyber threat attribution with multi-view heuristic analysis -- 5. Security of industrial cyberspace: fair clustering with linear time approximation -- 6. Adaptive neural trees for attack detection in cyber physical systems -- 7. Evaluating performance of scalable fair clustering machine learning techniques in detecting cyber-attacks in industrial control systems -- 8. Fuzzy bayesian learning for cyber threat hunting in industrial control systems -- 9. Cyber-attack detection in cyber-physical systems using supervised machine learning -- 10. Evaluation of scalable fair clustering machine learning methods for threat hunting in cyber-physical systems -- 11. Evaluation of supervised and unsupervised machine learning classifiers for mac os malware detection -- 12. Evaluation of machine learning algorithms on internet of things (iot) malware opcodes -- 13. Mac os x malware detection with supervised machine learning algorithms -- 14. Machine learning for osx malware detection -- 15. Hybrid analysis on credit card fraud detection using machine learning techniques -- 16. Mapping ckc model through nlp modelling for apt groups reports -- 17. Ransomware threat detection: a deep learning approach -- 18. Scalable fair clustering algorithm for internet of things malware classification.
520
$a
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs) The authors propose a deep learning-based approach to process cloud's log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter. The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS's cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS's cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated. This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters. This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.
650
0
$a
Computer security.
$3
540555
650
0
$a
Big data.
$3
2045508
650
0
$a
Digital forensic science.
$3
3338165
650
0
$a
Machine learning.
$3
533906
650
0
$a
Internet of things.
$3
2057703
650
0
$a
Artificial intelligence.
$3
516317
650
1 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Big Data.
$3
3134868
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Computer Crime.
$3
3382518
700
1
$a
Choo, Kim-Kwang Raymond.
$3
1001109
700
1
$a
Dehghantanha, Ali.
$3
3321249
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-74753-4
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9437553
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 H348 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入